<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMI</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Med Inform</journal-id>
      <journal-title>JMIR Medical Informatics</journal-title>
      <issn pub-type="epub">2291-9694</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
    <article-id pub-id-type="publisher-id">v6i1e14</article-id>
    <article-id pub-id-type="pmid">29506966</article-id>
    <article-id pub-id-type="doi">10.2196/medinform.8286</article-id>
    <article-categories>
      <subj-group subj-group-type="heading">
        <subject>Original Paper</subject>
      </subj-group>
      <subj-group subj-group-type="article-type">
        <subject>Original Paper</subject>
      </subj-group>
    </article-categories>
    <title-group>
      <article-title>Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation</article-title>
    </title-group>
    <contrib-group>
      <contrib contrib-type="editor">
        <name>
          <surname>Eysenbach</surname>
          <given-names>Gunther</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Shimizu</surname>
          <given-names>Kana</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Bian</surname>
          <given-names>Jiang</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Zhou</surname>
          <given-names>Leming</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="author" id="contrib1" corresp="yes">
      <name name-style="western">
        <surname>Sadat</surname>
        <given-names>Md Nazmus</given-names>
      </name>
      <degrees>BCompSc</degrees>
      <xref rid="aff1" ref-type="aff">1</xref>
      <address>
        <institution>Department of Computer Science</institution>
        <institution>University of Manitoba</institution>
        <addr-line>E2 EITC</addr-line>
        <addr-line>Winnipeg, MB, R3T2N2</addr-line>
        <country>Canada</country>
        <phone>1 858 375 6047</phone>
        <email>sadat@cs.umanitoba.ca</email>
      </address>  
      <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-1674-8764</ext-link></contrib>
      <contrib contrib-type="author" id="contrib2">
        <name name-style="western">
          <surname>Jiang</surname>
          <given-names>Xiaoqian</given-names>
        </name>
        <degrees>PhD</degrees>
        <xref rid="aff2" ref-type="aff">2</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-9933-2205</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib3">
        <name name-style="western">
          <surname>Aziz</surname>
          <given-names>Md Momin Al</given-names>
        </name>
        <degrees>MSc</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-6161-8275</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib4">
        <name name-style="western">
          <surname>Wang</surname>
          <given-names>Shuang</given-names>
        </name>
        <degrees>PhD</degrees>
        <xref rid="aff2" ref-type="aff">2</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-6420-983X</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib5">
        <name name-style="western">
          <surname>Mohammed</surname>
          <given-names>Noman</given-names>
        </name>
        <degrees>PhD</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-8547-9951</ext-link>
      </contrib>
    </contrib-group>
    <aff id="aff1">
    <sup>1</sup>
    <institution>Department of Computer Science</institution>
    <institution>University of Manitoba</institution>  
    <addr-line>Winnipeg, MB</addr-line>
    <country>Canada</country></aff>
    <aff id="aff2">
    <sup>2</sup>
    <institution>Department of Biomedical Informatics</institution>
    <institution>University of California San Diego</institution>  
    <addr-line>La Jolla, CA</addr-line>
    <country>United States</country></aff>
    <author-notes>
      <corresp>Corresponding Author: Md Nazmus Sadat 
      <email>sadat@cs.umanitoba.ca</email></corresp>
    </author-notes>
    <pub-date pub-type="collection"><season>Jan-Mar</season><year>2018</year></pub-date>
    <pub-date pub-type="epub">
      <day>05</day>
      <month>03</month>
      <year>2018</year>
    </pub-date>
    <volume>6</volume>
    <issue>1</issue>
    <elocation-id>e14</elocation-id>
    <!--history from ojs - api-xml-->
    <history>
      <date date-type="received">
        <day>23</day>
        <month>6</month>
        <year>2017</year>
      </date>
      <date date-type="rev-request">
        <day>31</day>
        <month>8</month>
        <year>2017</year>
      </date>
      <date date-type="rev-recd">
        <day>25</day>
        <month>10</month>
        <year>2017</year>
      </date>
      <date date-type="accepted">
        <day>3</day>
        <month>1</month>
        <year>2018</year>
      </date>
    </history>
    <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
    <copyright-statement>©Md Nazmus Sadat, Xiaoqian Jiang, Md Momin Al Aziz, Shuang Wang, Noman Mohammed. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 05.03.2018.</copyright-statement>
    <copyright-year>2018</copyright-year>
    <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
      <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Medical Informatics, is properly cited. The complete bibliographic information, a link to the original publication on http://medinform.jmir.org/, as well as this copyright and license information must be included.</p>
    </license>  
    <self-uri xlink:href="http://medinform.jmir.org/2018/1/e14/" xlink:type="simple"/>
    <abstract>
      <sec sec-type="background">
        <title>Background</title>
        <p>Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data.</p>
      </sec>
      <sec sec-type="objective">
        <title>Objective</title>
        <p>Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way.</p>
      </sec>
      <sec sec-type="methods">
        <title>Methods</title>
        <p>Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time.</p>
      </sec>
      <sec sec-type="results">
        <title>Results</title>
        <p>Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results.</p>
      </sec>
      <sec sec-type="conclusions">
        <title>Conclusions</title>
        <p>To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time.</p>
      </sec>
    </abstract>
    <kwd-group>
      <kwd>privacy-preserving regression analysis</kwd>
      <kwd>Intel SGX</kwd>
      <kwd>somewhat homomorphic encryption</kwd>
    </kwd-group></article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Machine learning algorithms are now being widely used in many applications to uncover deep and predictive insights from datasets that are large scale and diverse. For instance, building predictive models from biomedical data is very important in biomedical science. Such predictive models can identify genetic risk factors for a specific disease under study and can guide medical treatment. For instance, Tabaei and Hermana formulated a predictive equation to screen for diabetes [<xref ref-type="bibr" rid="ref1">1</xref>].</p>
      <p>Machine learning thrives on growing datasets. In most of the cases, the more data fed into a machine learning system, the more it can learn and offer the potential to make more accurate prediction. It is often known as “data never hurt in machine learning,” as insufficient information cannot lead to powerful learning systems. In the context of health care, building an accurate predictive model depends on the quality and quantity of aggregate clinical data, which come from different hospitals or health care institutions. Consequently, in a real-world scenario, machine learning applications use data from several sources, including genetic and genomic, clinical, and sensor data. Day by day, many new sources of data are becoming available—for instance, data from cell phones [<xref ref-type="bibr" rid="ref2">2</xref>], wearable sensors [<xref ref-type="bibr" rid="ref3">3</xref>], and participatory sensing applications [<xref ref-type="bibr" rid="ref4">4</xref>]. For instance, there are wearable sensing frameworks that collect sensing information regarding heart rate, body temperature, caloric expenditure, etc, to train machine learning models. These models are then used for predictive analysis [<xref ref-type="bibr" rid="ref4">4</xref>].</p>
      <p>Data collection, storage, and processing power of a single institution is not always adequate to handle the large-scale data used in cutting-edge machine learning applications. For rare diseases, individual institutions oftentimes do not have sufficient data to calculate a model to achieve sufficient statistical power. Therefore, data sharing among multiple institutions is required. However, sharing sensitive biomedical data (clinical or genomic) exposes many security and privacy threats [<xref ref-type="bibr" rid="ref5">5</xref>]. In case of data breach, there is a risk of sensitive personal information leakage. Therefore, in addition to addressing the fundamental goal of information retrieval, privacy-preserving learning also requires the learning algorithm to protect the confidentiality of the sensitive records of individuals. Along with obtaining the approval from an institutional review board, collaborative research on shared biomedical data often needs to satisfy 2 criteria at the same time: (1) permitting access to biomedical data for collaborative research, and (2) maintaining participants’ privacy and protecting the confidentiality of their genomic and clinical profile [<xref ref-type="bibr" rid="ref6">6</xref>]. For this reason, strict policies regarding biomedical data sharing have been enforced and, generally, these policies are different in different regions of the world. For instance, there are several key differences between the US Health Insurance Portability and Accountability Act (HIPAA) and the Canadian Personal Information Protection and Electronic Documents Act (PIPEDA). This difference in the policies and regulations of cross-border biomedical data sharing impedes international research projects greatly [<xref ref-type="bibr" rid="ref7">7</xref>]. It is imperative to address this problem with practical solutions to promote health science discoveries.</p>
      <p>In this paper, we concentrate on secure and efficient computation for a fundamental technique used in numerous learning algorithms called <italic>regression</italic> (see Methods). Regression analysis identifies the correlation among different attributes based on input data. Given a number of high-dimensional data points, regression analysis generates a best-fit line or curve through these points. To evaluate the fit, the value of a target attribute is predicted, which is associated with the given values of input. For instance, the input variables can be an individual’s age, weight, sex, body mass index, and glucose level, while the output can be the likelihood to develop diabetes. Although regression analysis is widely used in practice, little work has been done in privacy-preserving regression analysis over a distributed dataset. Our objective was to perform the required computation for regression analysis without exposing any other information of user data.</p>
      <sec>
        <title>Prior Works</title>
        <p>To ensure the security and privacy of the sensitive data used in learning algorithm, different techniques (eg, garbled circuit [<xref ref-type="bibr" rid="ref8">8</xref>], homomorphic encryption [<xref ref-type="bibr" rid="ref9">9</xref>], differential privacy [<xref ref-type="bibr" rid="ref10">10</xref>], and secure hardware [<xref ref-type="bibr" rid="ref11">11</xref>]) have been adopted (<xref ref-type="app" rid="app1">Multimedia Appendix 1</xref> discusses prior works targeting regression). But each of these techniques has certain shortcomings (eg, computational overhead, communication overhead, storage overhead, reduced data utility, and approximation error), which make these techniques difficult to use in real-world applications.</p>
        <p>Wu et al developed a framework, grid binary logistic regression (GLORE) [<xref ref-type="bibr" rid="ref12">12</xref>], for developing a binary logistic regression model where data are distributed across different data owners. In their proposed approach, instead of sharing patient records, data owners send intermediary results to a central entity. These intermediary results are then used to build a prediction model without sharing patient-level data. However, in their approach, the intermediary results are exchanged in plaintext. If the data size of a data owner is small, then sharing the intermediary results might compromise privacy.</p>
        <p>Later, Shi et al incorporated secure multiparty computation in GLORE. Their proposed framework, secure multiparty computation framework for grid logistic regression (SMAC-GLORE) [<xref ref-type="bibr" rid="ref13">13</xref>], protects the confidentiality of intermediary results beside the patient data. However, SMAC-GLORE cannot handle numbers outside of a predefined range, and it does not scale well (eg, it cannot efficiently handle data with more than 10 covariates). In addition, it uses a Taylor series approximation approach to evaluate the logit function. This approximation causes precision loss in the final output.</p>
      </sec>
      <sec>
        <title>Why Hybrid?</title>
        <p>There are two obvious but suboptimal solutions in terms of security and efficiency. Existing fully homomorphic encryption (FHE) techniques [<xref ref-type="bibr" rid="ref14">14</xref>] provide rigorous security, but these solutions are not efficient. In existing homomorphic encryption schemes, with subsequent homomorphic operations, the noise (and size) of the ciphertext grows substantially, which increases computational and storage overheads to a great extent (see Methods, Homomorphic Encryption for details). There are some operations to reduce the size and noise of the ciphertext: <italic>bootstrapping</italic> [<xref ref-type="bibr" rid="ref9">9</xref>] and <italic>relinearization</italic> [<xref ref-type="bibr" rid="ref15">15</xref>]. However, these operations are very expensive from the computational point of view. Our proposed framework does not use these expensive operations at all, which enhances the efficiency of the framework greatly.</p>
        <p>On the contrary, Software Guard Extensions (SGX; Intel)-based solutions are very efficient but have some security concerns resulting from the recent discovery of side-channel attacks against SGX [<xref ref-type="bibr" rid="ref16">16</xref>]. We developed our method so that only intermediary results, not individual records, are decrypted inside the secure hardware. Hence, a successful adversary would be unable to compromise the privacy of an individual.</p>
        <p>Our proposed hybrid framework uses both techniques and provides a good trade-off in terms of security and efficiency.</p>
      </sec>
      <sec>
        <title>Contributions</title>
        <p>In this paper, we propose a hybrid cryptographic framework for secure and efficient regression analysis (both linear and logistic). Our proposed framework leverages the best features of two secure computation schemes: somewhat homomorphic encryption (SWHE) and secure hardware (Intel SGX). In this framework, data reside at the data owner’s end. We assumed that data are horizontally partitioned, where all the records share same attributes. Inspired by GLORE [<xref ref-type="bibr" rid="ref12">12</xref>], we formulated the regression problem as decomposable parts. Data owners compute these decomposable intermediary results locally. Then, after encrypting these local results using homomorphic encryption, they send the encrypted intermediary results to an SGX-enabled central server. The central server now combines the intermediary results using a homomorphic addition operation. Then, these aggregate encrypted intermediary results are passed to the secure hardware hosted at the central server. Here, the aggregate intermediary results are decrypted and further computation is performed on plaintext. These computations involve matrix inversion and division, which are hard to handle in existing homomorphic encryption schemes. Finally, model coefficients are computed inside the secure hardware.</p>
        <p>We summarize our contributions as follows: (1) We address the limitations of existing secure computation schemes and propose a hybrid secure computation model for performing regression analysis over distributed data, which is more efficient and robust. (2) We designed the framework in such a way that no homomorphic multiplication is necessary, which is an expensive operation. In addition, we do not need any bootstrapping or relinearization operation. (3) In our proposed approach, a significant portion of computation is performed at the data owner’s end on plaintext. In computation at a central server, after homomorphic addition operations, further computation is performed inside secure hardware on plaintext. Since most of the operations are performed on plaintext, our proposed approach is very efficient. In addition, due to avoiding any kind of approximation technique, our proposed method does not introduce any precision loss in the final output.</p>
        <p>In <xref ref-type="app" rid="app1">Multimedia Appendix 1</xref> we introduce major existing secure computation techniques, application of these techniques in regression analysis, and their shortcomings.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Security Background</title>
        <sec>
          <title>Homomorphic Encryption</title>
          <p>The idea of an encryption scheme that is capable of performing arbitrary computation on encrypted data was first proposed by Rivest et al [<xref ref-type="bibr" rid="ref17">17</xref>] in 1978. Since then, several cryptosystems were invented that are homomorphic with respect to either addition or multiplication. Finally, Boneh et al [<xref ref-type="bibr" rid="ref18">18</xref>] proposed a partially homomorphic cryptosystem that is able to perform 1 multiplication and any number of additions. <xref ref-type="table" rid="table1">Table 1</xref> shows a partial list of homomorphic encryption schemes [<xref ref-type="bibr" rid="ref18">18</xref>-<xref ref-type="bibr" rid="ref22">22</xref>].</p>
          <p>Developing an encryption scheme that supports an arbitrary number of additions and multiplications was an open problem until 2009. Since addition and multiplication operations over integer ring <italic>Z</italic><sub>2</sub> form a complete set of operations, this type of encryption scheme supports any polynomial time computation on ciphertext. In 2009, Gentry showed the first construction of an FHE scheme [<xref ref-type="bibr" rid="ref9">9</xref>] that can do any number of addition and multiplication operations on encrypted data.</p>
          <p>To explain FHE, say ciphertext <italic>c</italic><sub><italic>i</italic></sub> is the encrypted form of plaintext <italic>m</italic><sub><italic>i</italic></sub>, where <italic>m</italic><sub><italic>i</italic></sub> and <italic>c</italic><sub><italic>i</italic></sub> are elements of a ring (the operations of the ring are addition and multiplication). In FHE, if a function <italic>f</italic> consists of addition and multiplication in the ring, then <italic>decryption</italic> (<italic>f</italic> (<italic>c</italic><sub>1</sub>,<italic>c</italic><sub>2</sub>,...,<italic>c</italic><sub>n</sub>)) = <italic>f</italic> (<italic>m</italic><sub>1</sub>,<italic>m</italic><sub>2</sub>,...,<italic>m</italic><sub>n</sub>). Generally, <italic>f</italic> is expressed by an arithmetic circuit over Gallois field(2). This is equivalent to a Boolean circuit with exclusive OR and AND gates.</p>
          <p>In the existing FHE schemes, a certain amount of noise needs to be introduced in the ciphertexts to ensure data confidentiality. This noise grows while performing homomorphic operations on ciphertexts. In particular, a homomorphic multiplication operation increases the size of the ciphertext abruptly. For instance, if 2 input ciphertexts have size <italic>M</italic> and <italic>N</italic>, then the output ciphertext will be of size <italic>M</italic>+<italic>N</italic>−1. If the amount of noise becomes too high, then the ciphertext cannot be decrypted correctly. To perform any number of homomorphic operations, the noise of the ciphertexts needs to be reduced. As mentioned before, this can be done using a method known as <italic>bootstrapping</italic> [<xref ref-type="bibr" rid="ref9">9</xref>], which is computationally expensive.</p>
          <p>In use cases where only a predetermined number of computational operations needs to be done, the costly bootstrapping process can be avoided by using an SWHE scheme [<xref ref-type="bibr" rid="ref23">23</xref>]. This scheme is often more efficient than using an FHE scheme with bootstrapping. SWHE schemes use a method called <italic>relinearization</italic> [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref24">24</xref>] to reduce the size of the ciphertext.</p>
          <table-wrap position="float" id="table1">
            <label>Table 1</label>
            <caption>
              <p>Partial list of homomorphic encryption schemes.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="750"/>
              <col width="250"/>
              <thead>
                <tr valign="top">
                  <td>Cryptosystem</td>
                  <td>Homomorphism</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Goldwasser and Micali [<xref ref-type="bibr" rid="ref19">19</xref>], Paillier [<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                  <td>Additive</td>
                </tr>
                <tr valign="top">
                  <td>Rivest et al [<xref ref-type="bibr" rid="ref21">21</xref>], ElGamal [<xref ref-type="bibr" rid="ref22">22</xref>]</td>
                  <td>Multiplicative</td>
                </tr>
                <tr valign="top">
                  <td>Boneh et al [<xref ref-type="bibr" rid="ref18">18</xref>]</td>
                  <td>Both</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
        </sec>
        <sec>
          <title>Intel Software Guard Extensions</title>
          <p>Intel SGX is a collection of extensions to the Intel architecture that mostly concentrates on the issue of running applications on a remote machine managed by an untrusted party. SGX enables parts of an application to run within secure portions of the central processing unit called <italic>enclaves</italic>. Untrusted entities, including system software, cannot access the enclave. SGX guarantees that the code and information inside an enclave cannot be manipulated from outside the enclave. Two SGX features facilitate provisioning of sensitive data to an enclave: attestation and sealing.</p>
          <p>SGX enclaves are generated without privacy-sensitive information. Privacy-sensitive information is provisioned after the enclave has been appropriately instantiated. This process of demonstrating that an application has been correctly instantiated within an enclave is called <italic>attestation</italic> [<xref ref-type="bibr" rid="ref25">25</xref>].</p>
          <p>At the point when an enclave is instantiated, SGX protects its data until they are kept within the enclave. In any case, when the enclave procedure terminates, the enclave will be destroyed and all related data will be lost. So, for later use, data should be stored outside the enclave. <italic>Sealing</italic> is the procedure that is used to store encrypted data to ensure that only the same enclave would be capable of unsealing them back to their previous form.</p>
        </sec>
      </sec>
      <sec>
        <title>System Architecture</title>
        <p>Our proposed framework has three main entities (<xref ref-type="fig" rid="figure1">Figure 1</xref>).</p>
        <sec>
          <title>Data Owners</title>
          <p>These parties are geographically distributed and possess databases. Data can come from a variety of sources, including cell phones, wearable sensors, and relational databases. Data owners send encrypted intermediary results to the central server so that it can analyze the combined dataset.</p>
        </sec>
        <sec>
          <title>Key Manager</title>
          <p>This generates and distributes the cryptographic keys that will be used for data encryption and decryption in different stages of our proposed framework. Each data owner gets a public key from the key manager and uses it for encrypting data.</p>
        </sec>
        <sec>
          <title>Central Server</title>
          <p>The central server maintains communication with all the other entities of the framework. It receives data from the data owners and computes the final result using SWHE and secure hardware.</p>
        </sec>
      </sec>
      <sec>
        <title>Threat Model</title>
        <p>In proposing this framework, our goal was to guarantee the confidentiality of data provided by different data owners. We assume that the central server is a semihonest party (also referred to as honest-but-curious), where it obeys the system protocol but may try to infer sensitive information by analyzing the system logs or received information [<xref ref-type="bibr" rid="ref26">26</xref>].</p>
        <p>We assume that the computation runs in an SGX-enabled central server. SGX architecture enables the central server to perform any computation securely on data provided by different data owners. We assume that the processor of the central server works properly and is not compromised. We trust the design and implementation of SGX and all cryptographic operations performed by it.</p>
        <p>In general, side-channel attacks against SGX can be classified into two categories: physical attacks (where the attacker has physical access to the machine) and software attacks (these are launched by any malicious software running in the same machine) [<xref ref-type="bibr" rid="ref27">27</xref>]. There has been no known successful physical attack against SGX. However, it is possible to exploit a type of software attack known as a <italic>synchronization bug</italic> [<xref ref-type="bibr" rid="ref28">28</xref>]. Synchronization bugs are possible to exploit because an untrusted operating system can manipulate the thread scheduling of enclaves. However, it is only applicable for multithreaded applications, whereas our application is single threaded.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Block diagram of the system architecture. SGX: Software Guard Extensions.</p>
          </caption>
          <graphic xlink:href="medinform_v6i1e14_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>There is another type of well-known software attack, which is called a <italic>page-fault attack</italic> [<xref ref-type="bibr" rid="ref16">16</xref>]. As the page tables are maintained in the operating system kernel and operated by the untrusted system software, page table entries can be manipulated to attack enclaves. But, since enclave pages are permission protected, malicious system software cannot compromise their integrity by manipulating them. However, Xu et al [<xref ref-type="bibr" rid="ref16">16</xref>] showed that, by clearing the present flag in the corresponding page table entries, the malicious software can generate traces of page access from the enclave. Although an adversary can observe access to different enclave pages, enclave memory can be treated as private at page-level granularity (4 kB) [<xref ref-type="bibr" rid="ref29">29</xref>]. In other words, a different access to an enclave page is indistinguishable to an adversary. Further research is required to better understand the gap between the potential vulnerabilities of SGX and proposed defense mechanisms. Most of the existing defense mechanism have been developed to address the page-fault side-channel attacks [<xref ref-type="bibr" rid="ref29">29</xref>-<xref ref-type="bibr" rid="ref31">31</xref>]. However, these mechanisms may not be effective for future attacks. Keeping these attacks in mind, we developed our framework to protect institutional privacy by combining the local inputs of participating institutions without decrypting them, therefore providing a higher layer of protection without introducing too much computational overhead.</p>
        <p>We did not consider the aspects of adversarial machine learning through obtained outputs. Adversarial parties may try to infer sensitive attributes of data by model inversion attacks [<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>].</p>
      </sec>
      <sec>
        <title>Linear Regression</title>
        <p>Suppose we are given a set of paired observations (<italic>x</italic><sub>i</sub>, <italic>y</italic><sub>i</sub>) for <italic>i</italic>=1,2,...,<italic>n</italic>, and we want to generate the best-fit straight line for these points. This straight line is given by <italic>y</italic>=β<sub>1</sub>+β<sub>2</sub><italic>x</italic>, for some β<sub>1</sub>,β<sub>2</sub>. The purpose is to explain the correlation between variable <italic>y</italic> and <italic>x</italic>. To evaluate the fit, the value of <italic>y</italic> is predicted that is associated with a given value of <italic>x</italic>. In the literature, <italic>y</italic> is called <italic>the variable to be explained</italic> (or the <italic>dependent</italic> variable) and <italic>x</italic> is called the <italic>explanatory variable</italic> (the <italic>regressor</italic>, the <italic>covariate</italic>, or the <italic>independent</italic> variable) [<xref ref-type="bibr" rid="ref34">34</xref>] (pg 79). Consider the following simple linear regression model: <italic>y</italic>=β<sub>1</sub>+β<sub>2</sub><italic>x</italic> +ε. Here, ε is the error we make in predicting <italic>y</italic>. For <italic>i</italic>=1,...,<italic>n</italic>, we obtain <italic>n</italic> equations: <italic>y</italic><sub>1</sub>=β<sub>1</sub>+β<sub>2</sub><italic>x</italic><sub>1</sub>+ε<sub>1</sub>, <italic>y</italic><sub>2</sub>=β<sub>1</sub>+β<sub>2</sub><italic>x</italic><sub>2</sub>+ε<sub>2</sub>, and <italic>y</italic><sub>n</sub>=β<sub>1</sub>+β<sub>2</sub><italic>x</italic><sub>n</sub>+ε<sub>n</sub>.</p>
        <p>We can formulate this regression model using the matrix in <xref ref-type="fig" rid="figure2">Figure 2</xref> (a).</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Equations used in developing the framework.</p>
          </caption>
          <graphic xlink:href="medinform_v6i1e14_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>In this way, the simple linear regression function can be represented by a short and simple equation:</p>
        <graphic xlink:href="medinform_v6i1e14_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        <p>The linear regression model with several explanatory variables is known as <italic>multiple linear regression</italic>. This is given by</p>
        <graphic xlink:href="medinform_v6i1e14_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        <p>Here, <italic>x</italic><sub>1<italic>i</italic></sub>=1, for <italic>i</italic>=1,...,<italic>n</italic>. The function of Equation 2 can also be expressed in matrix form, which is more convenient, as in <xref ref-type="fig" rid="figure2">Figure 2</xref> (b).</p>
        <p>It is noteworthy that Equation 1 is also applicable for multiple linear regression.</p>
        <p>Using the ordinary least squares estimate technique we can show that β=(<italic>X</italic><sup><italic>T</italic> </sup><italic>X</italic>)<sup>–1</sup><italic>X</italic><sup><italic>T</italic> </sup><italic>Y</italic> (for details, see Heij et al [<xref ref-type="bibr" rid="ref34">34</xref>], pg 79).</p>
        <p>For secure linear regression over distributed data, each data owner <italic>D</italic><sub><italic>i</italic> </sub> computes <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic> </sub><italic>X</italic><sub><italic>i</italic></sub> and <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic> </sub><italic>Y</italic><sub><italic>i</italic></sub> locally on plaintext. <italic>D</italic><sub><italic>i</italic></sub> then encrypts <italic>X</italic><sup>T</sup><sub>i</sub><italic>X</italic><sub>i</sub> and <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic> </sub><italic>Y</italic><sub><italic>i</italic></sub> using homomorphic encryption. After receiving these intermediary results from all of the data owners, the central server then adds these using homomorphic addition operations to construct <italic>X</italic><sup><italic>T</italic> </sup><italic>Y</italic> and <italic>X</italic><sup><italic>T</italic> </sup><italic>X</italic> (equation from <xref ref-type="fig" rid="figure2">Figure 2</xref> [c]). Further computation is performed inside the enclave after decryption. <xref ref-type="boxed-text" rid="box1">Textbox 1</xref> shows our secure linear regression algorithm.</p>
        <p><xref ref-type="fig" rid="figure3">Figure 3</xref> illustrates the sequence diagram of our proposed method. At first, the key manager establishes the public key and the private key. The private key is sent to the central server securely using remote attestation. The data owners then encrypt their data with the public key and send the encrypted data to the central server. Finally, the central server computes the model parameters.</p>
        <boxed-text id="box1" position="float">
          <title>Algorithm 1: secure linear regression.</title>
          <p><bold>Input</bold>: Each data owner <italic>D</italic><sub><italic>i</italic> </sub> provides encrypted <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic> </sub><italic>X</italic><sub><italic>i</italic></sub> and <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic> </sub><italic>Y</italic><sub><italic>i</italic></sub>.</p>
          <p><bold>Output</bold>: Model parameters (β)</p>
          <list list-type="order">
            <list-item>
              <p>Perform homomorphic addition over <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic> </sub><italic>X</italic><sub><italic>i</italic></sub> for each data owner <italic>i</italic>.</p>
            </list-item>
            <list-item>
              <p>Perform homomorphic addition over <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic> </sub><italic>Y</italic><sub><italic>i</italic></sub> for each data owner <italic>i</italic>.</p>
            </list-item>
            <list-item>
              <p>Send <italic>X</italic><sup><italic>T</italic> </sup><italic>Y</italic> and <italic>X</italic><sup><italic>T</italic> </sup><italic>X</italic> to enclave.</p>
            </list-item>
            <list-item>
              <p>Inside enclave, decrypt encrypted <italic>X</italic><sup><italic>T</italic> </sup><italic>Y</italic> and <italic>X</italic><sup><italic>T</italic> </sup><italic>X</italic>.</p>
            </list-item>
            <list-item>
              <p>Inside enclave, compute (<italic>X</italic><sup><italic>T</italic> </sup><italic>X</italic>)<sup>–1</sup>.</p>
            </list-item>
            <list-item>
              <p>Finally, compute β inside enclave.</p>
            </list-item>
          </list>
        </boxed-text>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Sequence diagram of our proposed framework. Ack: acknowledge; SGX: Software Guard Extensions.</p>
          </caption>
          <graphic xlink:href="medinform_v6i1e14_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Logistic Regression</title>
        <p>Logistic regression extends the principles of multiple linear regression to the case where the dependent variable <italic>y</italic> is binary (either 0 or 1). Like in multiple linear regression, the independent variables can be categorical or continuous.</p>
        <p>Instead of modeling the dependent variable directly, logistic regression models the probability of the dependent variable. Logistic regression uses the equation of linear regression equation (2). But, in that equation, the value of the dependent variable can fall outside [0, 1]. Therefore, a nonlinear transformation is used, which is called <italic>logit transformation</italic>. The logit function takes any value <italic>x</italic> and maps it onto a value between 0 and 1. Logit function is given by logit(<italic>x</italic>)=log[<italic>p</italic> /(1–<italic>p</italic>)] as in <xref ref-type="fig" rid="figure2">Figure 2</xref> (d). Therefore, <italic>probability</italic>=(<italic>y</italic>=1&#124; <italic>x</italic><sub>1</sub>, <italic>x</italic><sub>2</sub>,...,<italic>x</italic><sub>k</sub>) = [exp(β<sub>1</sub>+β<sub>2</sub><italic>x</italic><sub>2</sub>+...+β<sub><italic>k</italic> </sub><italic>x</italic><sub><italic>k</italic></sub>)]/[1+exp(β<sub>1</sub>+β<sub>2</sub><italic>x</italic><sub>2</sub>+...+β<sub><italic>k</italic> </sub><italic>x</italic><sub><italic>k</italic></sub>)] where β<sub>1</sub>, β<sub>2</sub>,...,B<sub><italic>k</italic> </sub> are unknown constants analogous to the multiple linear regression model. <italic>Probability</italic>=(<italic>y</italic>=1&#124; <italic>x</italic><sub>1</sub>, <italic>x</italic><sub>2</sub>,...,<italic>x</italic><sub><italic>k</italic> </sub>) denotes the probability that input (<italic>x</italic><sub>1</sub>, <italic>x</italic><sub>2</sub>,...,<italic>x</italic><sub><italic>k</italic> </sub>) belongs to default class (<italic>y</italic>=1).</p>
        <p>Logistic regression models are generally fit by maximum likelihood by using the conditional probability of <italic>y</italic> given <italic>x</italic>. Here, the Newton-Raphson method is used to solve the coefficients.</p>
        <p>Let <italic>X</italic> represent the matrix of <italic>x</italic><sub><italic>i</italic> </sub> values, <italic>Y</italic> represent the vector of <italic>y</italic><sub><italic>i</italic> </sub> values, <italic>P</italic> be the vector of fitted probabilities with the <italic>i</italic>th element <italic>p</italic> (<italic>x</italic><sub><italic>i</italic></sub>;β<sup><italic>old</italic> </sup>), and <italic>W</italic> be an <italic>n</italic> × <italic>n</italic> diagonal matrix of weights with <italic>i</italic>th diagonal element <italic>p</italic> (<italic>x</italic><sub><italic>i</italic></sub>;β<sup><italic>old</italic> </sup>)(1– <italic>p</italic> [<italic>x</italic><sub><italic>i</italic> </sub>;β<sup><italic>old</italic> </sup>]). Then a Newton step is as follows:</p>
        <graphic xlink:href="medinform_v6i1e14_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        <p>In the second and third steps, the Newton step is expressed as a weighted least squares step, with the response <italic>z</italic>= <italic>X</italic> β<sup><italic>old</italic></sup>+<italic>W</italic><sup>-1</sup>(<italic>Y</italic>–<italic>P</italic>). This method is also known as iteratively reweighted least squares, since each iteration solves the weighted least squares problem (see Friedman et al [<xref ref-type="bibr" rid="ref35">35</xref>] for details), as in <xref ref-type="fig" rid="figure2">Figure 2</xref> (e).</p>
        <p>In practice, the <italic>W</italic> matrix is not computed explicitly because its size could be huge. If we have 1000 rows of training data, matrix <italic>W</italic> would have 1,000,000 cells. For this reason, direct matrix operations with <italic>W</italic> may be very inefficient. Notice the beta update equation (Equation 3) has a term, <italic>WX</italic>, which means the matrix product of <italic>W</italic> and <italic>X</italic>. Because most of the values in <italic>W</italic> are zero, most of the matrix multiplication terms are also zero. This allows <italic>W</italic> times <italic>X</italic> to be computed directly from <italic>P</italic> and <italic>X</italic>, without explicitly constructing <italic>W</italic>. Several of the mathematical references that describe iteratively reweighted least squares with the Newton-Raphson algorithm for logistic regression use the symbol [<italic>X</italic> tilde] for the product of <italic>W</italic> and <italic>X</italic>. It is generally written as in <xref ref-type="fig" rid="figure2">Figure 2</xref> (f).</p>
        <p>For secure logistic regression over distributed data, each data owner <italic>D</italic><sub><italic>i</italic> </sub> computes <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic></sub>[<italic>X</italic> tilde]<sub><italic>i</italic> </sub> and <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic></sub>(<italic>Y</italic><sub><italic>i</italic></sub>– <italic>P</italic><sub><italic>i</italic> </sub>) locally on plaintext. <italic>D</italic><sub><italic>i</italic> </sub> then encrypts <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic></sub>[<italic>X</italic> tilde]<sub><italic>i</italic> </sub> and <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic></sub>(<italic>Y</italic><sub><italic>i</italic></sub>– <italic>P</italic><sub><italic>i</italic> </sub>) using homomorphic encryption. After receiving these intermediary results from all the data owners, the central server then adds these using homomorphic addition operations to construct <italic>X</italic><sup><italic>T</italic> </sup>[<italic>X</italic> tilde] and <italic>X</italic><sup><italic>T</italic> </sup>(<italic>Y</italic>– <italic>P</italic>) (equation from <xref ref-type="fig" rid="figure2">Figure 2</xref> [g]). Further computation is performed inside the enclave after decryption. After computing β, the central server sends β to all of the data owners. For the next iteration, data owner <italic>i</italic> computes <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic></sub>[<italic>X</italic> tilde]<sub><italic>i</italic> </sub> and <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic></sub>(<italic>Y</italic><sub><italic>i</italic></sub>– <italic>P</italic><sub>i</sub>) using new β (received from the central server) and sends these intermediary results to the central server. The central server then updates β using newly received <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic></sub>[<italic>X</italic> tilde]<sub><italic>i</italic> </sub> and <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic></sub>(<italic>Y</italic><sub><italic>i</italic></sub>– <italic>P</italic><sub><italic>i</italic> </sub>). In this way, iterations continue until parameters converge. <xref ref-type="boxed-text" rid="box2">Textbox 2</xref> shows our secure logistic regression algorithm.</p>
      </sec>
      <sec>
        <title>Implementation</title>
        <p>We developed our proposed framework using C++. For SWHE, we used the Simple Encrypted Arithmetic Library (SEAL) [<xref ref-type="bibr" rid="ref24">24</xref>]. SEAL is an easy-to-use homomorphic encryption library, with no external dependencies. There is another homomorphic encryption framework called HElib [<xref ref-type="bibr" rid="ref36">36</xref>], but we chose to use SEAL for its simplicity.</p>
        <boxed-text id="box2" position="float">
          <title>Algorithm 2: secure logistic regression.</title>
          <p><bold>Input:</bold> Each data owner <italic>D</italic><sub><italic>i</italic> </sub> provides encrypted <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic></sub>[<italic>X</italic> tilde]<sub><italic>i</italic> </sub> and <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic></sub>(<italic>Y</italic><sub><italic>i</italic></sub>– <italic>P</italic><sub><italic>i</italic> </sub>), and β is initialized to an all-zero vector.</p>
          <p><bold>Output:</bold> Model parameters</p>
          <list list-type="order">
            <list-item>
              <p>Receive encrypted <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic></sub>[<italic>X</italic> tilde]<sub><italic>i</italic> </sub> and <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic></sub>(<italic>Y</italic><sub><italic>i</italic></sub>– <italic>P</italic><sub><italic>i</italic> </sub>) from each data owner <italic>D</italic><sub><italic>i</italic> </sub>.</p>
            </list-item>
            <list-item>
              <p>Perform homomorphic addition over <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic></sub>[<italic>X</italic> tilde]<sub><italic>i</italic> </sub> for each data owner <italic>D</italic><sub><italic>i</italic> </sub>.</p>
            </list-item>
            <list-item>
              <p>Perform homomorphic addition over <italic>X</italic><sup><italic>T</italic> </sup><sub><italic>i</italic></sub>(<italic>Y</italic><sub><italic>i</italic></sub>– <italic>P</italic><sub><italic>i</italic> </sub>) for each data owner <italic>D</italic><sub><italic>i</italic> </sub>.</p>
            </list-item>
            <list-item>
              <p>Send encrypted <italic>X</italic><sup><italic>T</italic> </sup>[<italic>X</italic> tilde] and <italic>X</italic><sup><italic>T</italic> </sup>(<italic>Y</italic>– <italic>P</italic>) to enclave.</p>
            </list-item>
            <list-item>
              <p>Inside enclave, decrypt <italic>X</italic><sup><italic>T</italic> </sup>[<italic>X</italic> tilde] and <italic>X</italic><sup><italic>T</italic> </sup>(<italic>Y</italic>– <italic>P</italic>).</p>
            </list-item>
            <list-item>
              <p>Update β<sup>new</sup>=β<sup>old</sup>+(<italic>X</italic><sup><italic>T</italic> </sup>[<italic>X</italic> tilde])<sup>–1</sup><italic>X</italic><sup><italic>T</italic> </sup>(<italic>Y</italic>– <italic>P</italic>).</p>
            </list-item>
            <list-item>
              <p>If the stopping criteria are satisfied, then stop; otherwise, send β to each data owner and go to step 1.</p>
            </list-item>
          </list>
        </boxed-text>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Parameters used for the Simple Encrypted Arithmetic Library.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="750"/>
            <col width="250"/>
            <thead>
              <tr valign="top">
                <td>Parameters</td>
                <td>Value</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Polynomial modulus</td>
                <td><italic>x</italic><sup>1024</sup>+1</td>
              </tr>
              <tr valign="top">
                <td>Plaintext modulus</td>
                <td>1&#60;&#60;8</td>
              </tr>
              <tr valign="top">
                <td>Decomposition bit count</td>
                <td>32</td>
              </tr>
              <tr valign="top">
                <td>No. of coefficients reserved for fractional part</td>
                <td>64</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Size of datasets used for experiments.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="500"/>
            <col width="250"/>
            <col width="250"/>
            <thead>
              <tr valign="top">
                <td rowspan="2">Records</td>
                <td colspan="2">Dataset</td>
              </tr>
              <tr valign="top">
                <td>Haberman</td>
                <td>Low Birth Weight Study</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>No. of instances</td>
                <td>270</td>
                <td>488</td>
              </tr>
              <tr valign="top">
                <td>No. of features</td>
                <td>3</td>
                <td>8</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Experimental Settings and Dataset</title>
        <p>We performed experiments in a machine with an Intel Core i7-6700 (3.40 GHz) processor and 8 GB memory (Intel Corporation, Santa Clara, CA, USA). We used Intel SGX software development kit version 1.7. We simulated 2 data owners and the central server in this machine. <xref ref-type="table" rid="table2">Table 2</xref> shows the SEAL parameters.</p>
        <p>We performed experiments using Haberman’s survival dataset from the University of California, Irvine, Machine Learning Repository [<xref ref-type="bibr" rid="ref37">37</xref>] and the Longitudinal Low Birth Weight Study dataset from Hosmer and Lemeshow [<xref ref-type="bibr" rid="ref38">38</xref>]. The records of the datasets were evenly distributed between the 2 data owners.</p>
        <p><xref ref-type="table" rid="table3">Table 3</xref> lists the datasets we used with their sizes.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <p><xref ref-type="table" rid="table4">Table 4</xref> shows the experimental results. For SWHE, most of the computation time was due to homomorphic operations. Our proposed framework avoided expensive homomorphic multiplication by transferring the later phase of computation to the secure hardware. In addition, we needed to decrypt only the intermediary results, not every individual attribute value. Consequently, our proposed framework was more efficient than the solely secure hardware (SWHE)-based technique (where every individual attribute needs to be decrypted) and the SWHE-based technique (which involves many expensive homomorphic multiplication and relinearization operations). <xref ref-type="table" rid="table4">Table 4</xref> does not report the results for the SWHE-based technique. However, according to our empirical results, it took more than 2 hours for the Haberman dataset and more than 17 hours for the Low Birth Weight Study dataset for both kinds of regression analyses.</p>
      <table-wrap position="float" id="table4">
        <label>Table 4</label>
        <caption>
          <p>Experimental results for computation time.</p>
        </caption>
        <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
          <col width="30"/>
          <col width="470"/>
          <col width="250"/>
          <col width="250"/>
          <thead>
            <tr valign="top">
              <td rowspan="2" colspan="2">Regression analyses</td>
              <td colspan="2">Dataset</td>
            </tr>
            <tr valign="top">
              <td>Haberman</td>
              <td>Low Birth Weight Study</td>
            </tr>
          </thead>
          <tbody>
            <tr valign="top">
              <td colspan="2"><bold>Linear regression</bold></td>
              <td><break/></td>
              <td><break/></td>
            </tr>
            <tr valign="top">
              <td><break/></td>
              <td>Plaintext (ms)</td>
              <td>6</td>
              <td>25</td>
            </tr>
            <tr valign="top">
              <td><break/></td>
              <td>Proposed method (s)</td>
              <td>8.991</td>
              <td>39.382</td>
            </tr>
            <tr valign="top">
              <td><break/></td>
              <td>Secure hardware (SWHE<sup>a</sup>) (s)</td>
              <td>259.908</td>
              <td>880.228</td>
            </tr>
            <tr valign="top">
              <td><break/></td>
              <td>Secure hardware (AES<sup>b</sup>) (s)</td>
              <td>4.30</td>
              <td>8.54</td>
            </tr>
            <tr valign="top">
              <td colspan="2"><bold>Logistic regression</bold></td>
              <td><break/></td>
              <td><break/></td>
            </tr>
            <tr valign="top">
              <td><break/></td>
              <td>Plaintext (ms)</td>
              <td>171</td>
              <td>886</td>
            </tr>
            <tr valign="top">
              <td><break/></td>
              <td>Proposed method (s)</td>
              <td>27.037</td>
              <td>162.544</td>
            </tr>
            <tr valign="top">
              <td><break/></td>
              <td>Secure hardware (SWHE) (s)</td>
              <td>264.669</td>
              <td>904.718</td>
            </tr>
            <tr valign="top">
              <td><break/></td>
              <td>Secure hardware (AES) (s)</td>
              <td>4.65</td>
              <td>8.64</td>
            </tr>
          </tbody>
        </table>
        <table-wrap-foot>
          <fn id="table4fn1">
            <p><sup>a</sup>SWHE: somewhat homomorphic encryption.</p>
          </fn>
          <fn id="table4fn2">
            <p><sup>b</sup>AES: Advanced Encryption Standard.</p>
          </fn>
        </table-wrap-foot>
      </table-wrap>
      <table-wrap position="float" id="table5">
        <label>Table 5</label>
        <caption>
          <p>Storage overhead for the secure hardware approach.</p>
        </caption>
        <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
          <col width="500"/>
          <col width="250"/>
          <col width="250"/>
          <thead>
            <tr valign="top">
              <td rowspan="2">Overhead before and after encryption</td>
              <td colspan="2">Dataset</td>
            </tr>
            <tr valign="top">
              <td>Haberman</td>
              <td>Low Birth Weight Study</td>
            </tr>
          </thead>
          <tbody>
            <tr valign="top">
              <td>Before encryption (kB)</td>
              <td>3.8</td>
              <td>28</td>
            </tr>
            <tr valign="top">
              <td>After encryption (SWHE<sup>a</sup>) (MB)</td>
              <td>30.3</td>
              <td>123</td>
            </tr>
            <tr valign="top">
              <td>After encryption (AES<sup>b</sup>) (kB)</td>
              <td>36</td>
              <td>143</td>
            </tr>
          </tbody>
        </table>
        <table-wrap-foot>
          <fn id="table5fn1">
            <p><sup>a</sup>SWHE: somewhat homomorphic encryption.</p>
          </fn>
          <fn id="table5fn2">
            <p><sup>b</sup>AES: Advanced Encryption Standard.</p>
          </fn>
        </table-wrap-foot>
      </table-wrap>
      <p>We want to emphasize that, although the secure hardware (Advanced Encryption Standard [AES]) method is faster, state-of-the-art attack models targeting SGX show that solely secure hardware-based approaches might expose data from participating institutions to potential attackers (as explained above). Our method, although a little bit slower, preserves such institutional privacy by combining the local inputs without decrypting them; therefore, it offers a stronger security guarantee without imposing too much computation or storage cost. In this way, our proposed hybrid model provides a good trade-off in terms of security and efficiency.</p>
      <p><xref ref-type="table" rid="table5">Table 5</xref> shows the storage overhead of the solely secure hardware-based approach. For SWHE, times required to encrypt the datasets were 4.37 minutes for the Haberman dataset and 18.46 minutes for the Low Birth Weight Study dataset. For AES, times required to encrypt the datasets were 14 milliseconds for the Haberman dataset and 38 milliseconds for the Low Birth Weight Study dataset.</p>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Comparison With Prior Work</title>
        <p>There is a homomorphic encryption-based implementation of linear regression [<xref ref-type="bibr" rid="ref14">14</xref>], which required 2 days to compute on a dataset containing 51,000 input vectors of 22 features with a key size of 1024 bits. That matrix inversion procedure took 1 day to complete because matrix inversion is a very expensive computational task in homomorphic encryption. In our proposed method, we performed matrix inversion on plaintext in secure hardware, which is much more efficient.</p>
        <p>Hall et al [<xref ref-type="bibr" rid="ref14">14</xref>] proposed an iterative matrix inversion algorithm, which introduces approximation errors when a fixed number of iterations is used. Their method offers a low accuracy of 10<sup>–3</sup>. Precision can be slightly improved by choosing greater values for the 2 constants used by their method. However, this would require a larger public key, which would introduce significant computation overhead. In contrast, in our proposed method, there is no approximation error: the regression coefficients are completely identical to the plaintext results.</p>
      </sec>
      <sec>
        <title>Security Discussions</title>
        <p>In the Methods (Threat Model subsection), we discussed the security of SGX, specifically different side-channel attacks on SGX, and how we treat those attacks in our proposed framework. Addressing these attacks, we developed our framework in such a way that it can protect institutional privacy by combining the local inputs of participating institutions without decrypting them. This approach provides a higher layer of security without imposing too much computational cost.</p>
        <p>In our proposed method, only intermediate values (eg, <italic>X</italic><sup><italic>T</italic> </sup><italic>Y</italic>, <italic>X</italic><sup><italic>T</italic> </sup><italic>X</italic>) are decrypted inside secure hardware. Even if the hardware is compromised (or, in case of a side-channel attack), it is not possible to retrieve any sensitive attribute from those intermediary results. Hence, our proposed hybrid model not only achieves good performance but also guarantees stronger security than the solely SGX-based techniques. Dowlin et al [<xref ref-type="bibr" rid="ref24">24</xref>] and Pass et al [<xref ref-type="bibr" rid="ref25">25</xref>] discussed the security of SEAL and Intel SGX further.</p>
        <p>A symmetric cryptosystem like AES requires <italic>n</italic> remote attestations to distribute the key to <italic>n</italic> data owners, which results in much more network communication, which might be prone to attack. In contrast, our proposed framework relies on public-key cryptography, where the data owners use a public key to encrypt their data published by the key manager. In this way, our proposed method reduces the attack surface of the system model, makes key distribution much simpler, and avoids additional communication overhead.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>There are some limitations of our proposed framework.</p>
        <p>First, we did not consider the issue of model privacy. Several works based on differential privacy have addressed inference attacks (eg, model privacy [<xref ref-type="bibr" rid="ref39">39</xref>]). These solutions are complementary to our proposed method and can be readily incorporated into a single framework.</p>
        <p>Second, the central server of our proposed method must be SGX enabled; that is, it must use an Intel processor of sixth generation or later.</p>
        <p>Third, since computing coefficients for logistic regression require multiple iterations, all parties must be synchronized until coefficients converge. However, linear regression does not require multiple iterations. So, in this case, parties can be offline just after sending their intermediary results.</p>
      </sec>
      <sec>
        <title>Generalizability</title>
        <p>Others have addressed training machine learning models (eg, support vector machines [<xref ref-type="bibr" rid="ref40">40</xref>]) over distributed data [<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. Our proposed method can be easily applied to this kind of technique.</p>
      </sec>
      <sec>
        <title>Cost of Deployment</title>
        <p>The Intel SGX feature is available in all Intel Skylake and Kaby Lake processors. The price of an Intel Skylake or Kaby Lake processor is identical to that of processors from other vendors (having similar configuration). Price ranges from US $42 to US $1207 depending on configuration [<xref ref-type="bibr" rid="ref43">43</xref>]. Recently, Microsoft started using SGX-capable servers in their Azure confidential computing service [<xref ref-type="bibr" rid="ref44">44</xref>]. Azure confidential computing is offering the developers the ability to develop applications on top of Intel SGX software development kit. Apparently, there will be no significant additional charge for using this service.</p>
      </sec>
      <sec>
        <title>Conclusion</title>
        <p>In this age of big data, data need to be analyzed to uncover valuable insights and patterns. But this kind of analysis poses a threat to individual privacy, since data often contain sensitive information. In this paper, we address this data security and privacy issue and propose a hybrid cryptographic framework to overcome the limitations of the existing cryptographic techniques. We think that secure hardware–assisted predictive analysis of biomedical data is very promising for health care and medical research.</p>
        <p>In future work, we will investigate the applicability of our proposed method to other learning algorithms such as neural networks, support vector machines, and decision trees.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <app id="app1">
        <title>Multimedia Appendix 1</title>
        <p>Related works.</p>
        <media xlink:href="medinform_v6i1e14_app1.pdf" xlink:title="PDF File (Adobe PDF File), 76KB"/>
      </app>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AES</term>
          <def>
            <p>Advanced Encryption Standard</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">FHE</term>
          <def>
            <p>fully homomorphic encryption</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">GLORE</term>
          <def>
            <p>grid binary logistic regression</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">HIPAA</term>
          <def>
            <p>Health Insurance Portability and Accountability Act</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">PIPEDA</term>
          <def>
            <p>Personal Information Protection and Electronic Documents Act</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">SEAL</term>
          <def>
            <p>Simple Encrypted Arithmetic Library</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">SGX</term>
          <def>
            <p>Software Guard Extensions</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">SWHE</term>
          <def>
            <p>somewhat homomorphic encryption</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work was funded in part by the National Human Genome Research Institute (R00HG008175) and the National Institute of Biomedical Imaging and Bioengineering (U01EB023685), the Natural Sciences and Engineering Research Council of Canada Discovery Grants (RGPIN-2015-04147), the National Institute of General Medical Sciences (R01GM118574 and R01GM114612), and the University Research Grants Program from the University of Manitoba, Winnipeg, Manitoba, Canada.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Tabaei</surname>
            <given-names>BP</given-names>
          </name>
          <name name-style="western">
            <surname>Herman</surname>
            <given-names>WH</given-names>
          </name>
        </person-group>
        <article-title>A multivariate logistic regression equation to screen for diabetes: development and validation</article-title>
        <source>Diabetes Care</source>  
        <year>2002</year>  
        <month>11</month>  
        <volume>25</volume>  
        <issue>11</issue>  
        <fpage>1999</fpage>  
        <lpage>2003</lpage>  
        <pub-id pub-id-type="medline">12401746</pub-id></nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Abdullah</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Murnane</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Matthews</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Kay</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Kientz</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Gay</surname>
            <given-names>G</given-names>
          </name>
        </person-group>
        <article-title>Cognitive rhythms: unobtrusive and continuous sensing of alertness using a mobile phone</article-title>
        <year>2016</year>  
        <conf-name>ACM International Joint Conference on Pervasive and Ubiquitous Computing</conf-name>
        <conf-date>Sep 12-16, 2016</conf-date>
        <conf-loc>Heidelberg, Germany</conf-loc>
        <fpage>178</fpage>  
        <lpage>189</lpage> </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Rahman</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Czerwinski</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Gilad-Bachrach</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Johns</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Predicting about-to-eat moments for just-in-time eating intervention</article-title>
        <year>2016</year>  
        <conf-name>6th International Conference on Digital Health</conf-name>
        <conf-date>Apr 11-13, 2016</conf-date>
        <conf-loc>Montreal, QC, Canada</conf-loc>
        <fpage>141</fpage>  
        <lpage>150</lpage> </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Ahmadi</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Pham</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Ganti</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Abdelzaher</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Nath</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Han</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Privacy-aware regression modeling of participatory sensing data</article-title>
        <year>2010</year>  
        <conf-name>8th ACM Conference on Embedded Networked Sensor Systems</conf-name>
        <conf-date>Nov 3-5, 2010</conf-date>
        <conf-loc>Zurich, Switzerland</conf-loc>
        <fpage>99</fpage>  
        <lpage>112</lpage> </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>El Emam</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Hu</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Mercer</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Peyton</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Kantarcioglu</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Malin</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Buckeridge</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Samet</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Earle</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>A secure protocol for protecting the identity of providers when disclosing data for disease surveillance</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2011</year>  
        <month>05</month>  
        <day>01</day>  
        <volume>18</volume>  
        <issue>3</issue>  
        <fpage>212</fpage>  
        <lpage>7</lpage>  
        <pub-id pub-id-type="doi">10.1136/amiajnl-2011-000100</pub-id>
        <pub-id pub-id-type="medline">21486880</pub-id>
        <pub-id pub-id-type="pii">18/3/212</pub-id>
        <pub-id pub-id-type="pmcid">PMC3078664</pub-id></nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>Council of Canadian Academies</collab>
        </person-group>
        <source>Accessing health and health-related data in Canada: the Expert Panel on Timely Access to Health and Social Data for Health Research and Health System Innovation</source>  
        <year>2015</year>  
        <access-date>2018-02-20</access-date>
        <publisher-loc>Ottawa, ON</publisher-loc>
        <publisher-name>Council of Canadian Academies</publisher-name>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.scienceadvice.ca/uploads/eng/assessments%20and%20publications%20and%20news%20releases/health-data/healthdatafullreporten.pdf">http://www.scienceadvice.ca/uploads/eng/assessments%20and%20publications%20and%20news%20releases/health-data/healthdatafullreporten.pdf</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6xNM7ZqMr"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hayden</surname>
            <given-names>EC</given-names>
          </name>
        </person-group>
        <article-title>Geneticists push for global data-sharing</article-title>
        <source>Nature</source>  
        <year>2013</year>  
        <month>06</month>  
        <day>06</day>  
        <volume>498</volume>  
        <issue>7452</issue>  
        <fpage>16</fpage>  
        <lpage>7</lpage>  
        <pub-id pub-id-type="doi">10.1038/498017a</pub-id>
        <pub-id pub-id-type="medline">23739403</pub-id>
        <pub-id pub-id-type="pii">498017a</pub-id></nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Yao</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Protocols for secure computations</article-title>
        <year>1982</year>  
        <conf-name>23rd Annual Symposium on Foundations of Computer Science</conf-name>
        <conf-date>Nov 3-5, 1982</conf-date>
        <conf-loc>Chicago, IL, USA</conf-loc>
        <fpage>160</fpage>  
        <lpage>164</lpage>  
        <pub-id pub-id-type="doi">10.1109/SFCS.1982.88</pub-id></nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gentry</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <source>A Fully Homomorphic Encryption Scheme [doctoral thesis]</source>  
        <year>2009</year>  
        <publisher-loc>Stanford, CA</publisher-loc>
        <publisher-name>Stanford University</publisher-name></nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Dwork</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Differential privacy</article-title>
        <year>2006</year>  
        <conf-name>33rd International Colloquium on Automata, Languages and Programming, part II (ICALP 2006)</conf-name>
        <conf-date>July 10-14, 2006</conf-date>
        <conf-loc>Venice, Italy</conf-loc>
        <fpage>1</fpage>  
        <lpage>12</lpage> </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hoekstra</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Lal</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Pappachan</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Phegade</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Del Cuvillo</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Using innovative instructions to create trustworthy software solutions</article-title>
        <year>2013</year>  
        <conf-name>HASP@ ISCA 2013</conf-name>
        <conf-date>June 23-24, 2013</conf-date>
        <conf-loc>Tel-Aviv, Israel</conf-loc>
        <fpage>11</fpage> </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Wu</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Jiang</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Ohno-Machado</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>Grid Binary LOgistic REgression (GLORE): building shared models without sharing data</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2012</year>  
        <volume>19</volume>  
        <issue>5</issue>  
        <fpage>758</fpage>  
        <lpage>64</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22511014"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1136/amiajnl-2012-000862</pub-id>
        <pub-id pub-id-type="medline">22511014</pub-id>
        <pub-id pub-id-type="pii">amiajnl-2012-000862</pub-id>
        <pub-id pub-id-type="pmcid">PMC3422844</pub-id></nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Shi</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Jiang</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Dai</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Jiang</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Tang</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Ohno-Machado</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Secure Multi-pArty Computation Grid LOgistic REgression (SMAC-GLORE)</article-title>
        <source>BMC Med Inform Decis Mak</source>  
        <year>2016</year>  
        <month>07</month>  
        <day>25</day>  
        <volume>16 Suppl 3</volume>  
        <fpage>89</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/s12911-016-0316-1"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/s12911-016-0316-1</pub-id>
        <pub-id pub-id-type="medline">27454168</pub-id>
        <pub-id pub-id-type="pii">10.1186/s12911-016-0316-1</pub-id>
        <pub-id pub-id-type="pmcid">PMC4959358</pub-id></nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hall</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Fienberg</surname>
            <given-names>SE</given-names>
          </name>
          <name name-style="western">
            <surname>Nardi</surname>
            <given-names>Y</given-names>
          </name>
        </person-group>
        <article-title>Secure multiple linear regression based on homomorphic encryption</article-title>
        <source>J Off Stat</source>  
        <year>2011</year>  
        <volume>27</volume>  
        <issue>4</issue>  
        <fpage>669</fpage> </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Laine</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Player</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <source>Simple Encrypted Arithmetic Library-SEAL (v2. 0). Technical report</source>  
        <year>2016</year>  
        <month>09</month>  
        <access-date>2018-02-20</access-date>
        <publisher-loc>Redmond, WA</publisher-loc>
        <publisher-name>Microsoft Research</publisher-name>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.microsoft.com/en-us/research/wp-content/uploads/2016/09/sealmanual.pdf">https://www.microsoft.com/en-us/research/wp-content/uploads/2016/09/sealmanual.pdf</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6xNMHiO5F"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Xu</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Cui</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Peinado</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Controlled-channel attacks: deterministic side channels for untrusted operating systems</article-title>
        <year>2015</year>  
        <conf-name>IEEE Symposium on SecurityPrivacy</conf-name>
        <conf-date>May 18-20, 2015</conf-date>
        <conf-loc>San Jose, CA, USA</conf-loc>
        <fpage>640</fpage>  
        <lpage>656</lpage> </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Rivest</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Adleman</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Dertouzos</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>On data banks and privacy homomorphisms</article-title>
        <source>Found Secur Comput</source>  
        <year>1978</year>  
        <volume>4</volume>  
        <issue>11</issue>  
        <fpage>169</fpage>  
        <lpage>180</lpage> </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Boneh</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Goh</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Nissim</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Kilian</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Evaluating 2-DNF formulas on ciphertexts</article-title>
        <source>Theory of Cryptography</source>  
        <year>2005</year>  
        <publisher-loc>Cham, Switzerland</publisher-loc>
        <publisher-name>Springer International Publishing AG</publisher-name>
        <fpage>325</fpage>  
        <lpage>341</lpage> </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Goldwasser</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Micali</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Probabilistic encryption: how to play mental poker keeping secrl partial information</article-title>
        <year>1982</year>  
        <conf-name>Fourteenth Annual ACM Symposium on Theory of Computing</conf-name>
        <conf-date>May 5-7, 1982</conf-date>
        <conf-loc>San Francisco, CA, USA</conf-loc>
        <fpage>365</fpage>  
        <lpage>377</lpage> </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Paillier</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Stern</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Public-key cryptosystems based on composite degree residuosity classes</article-title>
        <source>Advances in Cryptology-EUROCRYPT ’99</source>  
        <year>1999</year>  
        <publisher-loc>Cham, Switzerland</publisher-loc>
        <publisher-name>Springer International Publishing AG</publisher-name>
        <fpage>223</fpage>  
        <lpage>238</lpage> </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Rivest</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Shamir</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Adleman</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>A method for obtaining digital signatures and public-key cryptosystems</article-title>
        <source>Commun ACM Feb</source>  
        <year>1978</year>  
        <volume>21</volume>  
        <issue>2</issue>  
        <fpage>120</fpage>  
        <lpage>126</lpage> </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Elgamal</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>A public key cryptosystem and a signature scheme based on discrete logarithms</article-title>
        <source>IEEE Trans Inf Theory Jul</source>  
        <year>1985</year>  
        <volume>31</volume>  
        <issue>4</issue>  
        <fpage>469</fpage>  
        <lpage>472</lpage> </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Brakerski</surname>
            <given-names>Z</given-names>
          </name>
          <name name-style="western">
            <surname>Gentry</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Vaikuntanathan</surname>
            <given-names>V</given-names>
          </name>
        </person-group>
        <article-title>(Leveled) fully homomorphic encryption without bootstrapping</article-title>
        <source>ACM Trans Comput Theory</source>  
        <year>2014</year>  
        <volume>6</volume>  
        <issue>3</issue>  
        <fpage>13</fpage> </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Dowlin</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Gilad-Bachrach</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Laine</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Lauter</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Naehrig</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Wernsing</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Manual for using homomorphic encryption for bioinformatics</article-title>
        <source>Proc IEEE</source>  
        <year>2017</year>  
        <month>03</month>  
        <volume>105</volume>  
        <issue>3</issue>  
        <fpage>552</fpage>  
        <lpage>567</lpage> </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Pass</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Shi</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Tramer</surname>
            <given-names>F</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Coron</surname>
            <given-names>JS</given-names>
          </name>
          <name name-style="western">
            <surname>Nielsen</surname>
            <given-names>JB</given-names>
          </name>
        </person-group>
        <article-title>Formal abstractions for attested execution secure processors</article-title>
        <source>Advances in Cryptology - EUROCRYPT 2017</source>  
        <year>2017</year>  
        <publisher-loc>Cham, Switzerland</publisher-loc>
        <publisher-name>Springer International Publishing AG</publisher-name></nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Goldreich</surname>
            <given-names>O</given-names>
          </name>
        </person-group>
        <source>Foundations of Cryptography. Volume 2: Basic Applications</source>  
        <year>2009</year>  
        <publisher-loc>Cambridge, UK</publisher-loc>
        <publisher-name>Cambridge University Press</publisher-name></nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Fisch</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Vinayagamurthy</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Boneh</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Gorbunov</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <source>IACR Cryptology ePrint Archive</source>  
        <year>2016</year>  
        <access-date>2018-02-20</access-date>
        <comment>IRON: functional encryption using Intel SGX 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://eprint.iacr.org/2016/1071.pdf">https://eprint.iacr.org/2016/1071.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6xMvkInRB"/></comment> </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Weichbrodt</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Kurmus</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Pietzuch</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Kapitza</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>Asyncshock: exploiting synchronisation bugs in Intel SGX enclaves</article-title>
        <year>2016</year>  
        <conf-name>21st European Symposium on Research in Computer Security</conf-name>
        <conf-date>Sep 26-30, 2016</conf-date>
        <conf-loc>Heraklion, Crete, Greece</conf-loc>
        <fpage>440</fpage>  
        <lpage>457</lpage> </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Shinde</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Chua</surname>
            <given-names>Z</given-names>
          </name>
          <name name-style="western">
            <surname>Narayanan</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Saxena</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Preventing page faults from telling your secrets</article-title>
        <year>2016</year>  
        <conf-name>11th ACM on Asia Conference on Computer and Communications Security</conf-name>
        <conf-date>May 30-Jun 3, 2016</conf-date>
        <conf-loc>Sian, China</conf-loc>
        <fpage>317</fpage>  
        <lpage>328</lpage> </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Chen</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Pan</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Bindschaedler</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Tang</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Gunter</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <source>Leaky cauldron on the dark land: understanding memory side-channel hazards in SGX. arXiv:1705.07289</source>  
        <year>2017</year>  
        <month>08</month>  
        <day>30</day>  
        <access-date>2018-02-14</access-date>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://arxiv.org/abs/1705.07289">https://arxiv.org/abs/1705.07289</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6xED5tDYT"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Costan</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Lebedev</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>Devadas</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Sanctum: minimal hardware extensions for strong software isolation</article-title>
        <year>2016</year>  
        <conf-name>25th USENIX Security Symposium</conf-name>
        <conf-date>Aug 10-12, 2016</conf-date>
        <conf-loc>Austin, TX, USA</conf-loc>
        <fpage>857</fpage>  
        <lpage>874</lpage> </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Fredrikson</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Jha</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Ristenpart</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>Model inversion attacks that exploit confidence informationbasic countermeasures</article-title>
        <year>2015</year>  
        <conf-name>22nd ACM SIGSAC Conference on Computer and Communications Security</conf-name>
        <conf-date>Oct 12-16, 2015</conf-date>
        <conf-loc>Denver, CO, USA</conf-loc>
        <fpage>1322</fpage>  
        <lpage>1333</lpage> </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Fredrikson</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Lantz</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Jha</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Lin</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Page</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Ristenpart</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing</article-title>
        <year>2014</year>  
        <conf-name>23rd USENIX Security Symposium</conf-name>
        <conf-date>Aug 20-22, 2014</conf-date>
        <conf-loc>San Diego, CA, USA</conf-loc>
        <fpage>17</fpage>  
        <lpage>32</lpage> </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Heij</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>de Boer</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Franses</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Kloek</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>van Dijk</surname>
            <given-names>HK</given-names>
          </name>
        </person-group>
        <source>Econometric Methods With Applications in Business and Economics</source>  
        <year>2004</year>  
        <publisher-loc>Oxford, UK</publisher-loc>
        <publisher-name>Oxford University Press</publisher-name></nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Friedman</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Hastie</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Tibshirani</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <source>The Elements of Statistical Learning. Springer Series in Statistics</source>  
        <year>2001</year>  
        <publisher-loc>Berlin, Germany</publisher-loc>
        <publisher-name>Springer</publisher-name></nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Halevi</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Shoup</surname>
            <given-names>V</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Garay</surname>
            <given-names>JA</given-names>
          </name>
          <name name-style="western">
            <surname>Gennaro</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>Algorithms in HElib</article-title>
        <source>Advances in Cryptology - CRYPTO 2014</source>  
        <year>2014</year>  
        <publisher-loc>Cham, Switzerland</publisher-loc>
        <publisher-name>Springer International Publishing AG</publisher-name>
        <fpage>554</fpage>  
        <lpage>571</lpage> </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lichman</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <source>UCI Machine Learning Repository</source>  
        <year>2013</year>  
        <access-date>2018-02-14</access-date>
        <publisher-loc>Irvine, CA</publisher-loc>
        <publisher-name>University of California, Irvine, School of Information and Computer Sciences</publisher-name>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://archive.ics.uci.edu/ml/">http://archive.ics.uci.edu/ml/</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6xEDJtnq9"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hosmer</surname>
            <given-names>DJ</given-names>
          </name>
          <name name-style="western">
            <surname>Lemeshow</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Sturdivant</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <source>Applied Logistic Regression</source>  
        <year>2013</year>  
        <publisher-loc>New York, NY</publisher-loc>
        <publisher-name>John Wiley &#38; Sons</publisher-name></nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Abadi</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Chu</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Goodfellow</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>McMahan</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Mironov</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>Talwar</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>Deep learning with differential privacy</article-title>
        <year>2016</year>  
        <conf-name>ACM SIGSAC Conference on Computer and Communications Security</conf-name>
        <conf-date>Oct 24-28, 2016</conf-date>
        <conf-loc>Vienna, Austria</conf-loc>
        <fpage>308</fpage>  
        <lpage>318</lpage> </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Vapnik</surname>
            <given-names>V</given-names>
          </name>
        </person-group>
        <source>The Nature of Statistical Learning Theory</source>  
        <year>2013</year>  
        <publisher-loc>Cham, Switzerland</publisher-loc>
        <publisher-name>Springer International Publishing AG</publisher-name></nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Yu</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Jiang</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Vaidya</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data</article-title>
        <year>2006</year>  
        <conf-name>ACM Symposium on Applied Computing</conf-name>
        <conf-date>Apr 23-27, 2006</conf-date>
        <conf-loc>Dijon, France</conf-loc>
        <fpage>603</fpage>  
        <lpage>610</lpage> </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Yu</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Vaidya</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Jiang</surname>
            <given-names>X</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Ng</surname>
            <given-names>WK</given-names>
          </name>
          <name name-style="western">
            <surname>Kitsuregawa</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Li</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Chang</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>Privacy-preserving SVM classification on vertically partitioned data</article-title>
        <source>Advances in Knowledge Discovery and Data Mining</source>  
        <year>2006</year>  
        <publisher-loc>Cham, Switzerland</publisher-loc>
        <publisher-name>Springer International Publishing AG</publisher-name>
        <fpage>647</fpage>  
        <lpage>656</lpage> </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="web">
        <source>Products formerly Skylake</source>  
        <access-date>2017-10-11</access-date>
        <publisher-loc>Santa Clara, CA</publisher-loc>
        <publisher-name>Intel Corporation</publisher-name>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://ark.intel.com/products/codename/37572/Skylake">http://ark.intel.com/products/codename/37572/Skylake</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6u8vlW2Om"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Russinovich</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <source>Introducing Azure confidential computing</source>  
        <year>2017</year>  
        <month>09</month>  
        <day>14</day>  
        <access-date>2017-10-11</access-date>
        <publisher-loc>Seattle, WA</publisher-loc>
        <publisher-name>Microsoft</publisher-name>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://azure.microsoft.com/en-us/blog/introducing-azure-confidential-computing/">https://azure.microsoft.com/en-us/blog/introducing-azure-confidential-computing/</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6u8ux4Vmd"/>
        </comment> </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
