Research article Special Issues

SE-PSI: Fog/Cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom Filter

  • Private Set Intersection (PSI), which is a hot topic in recent years, has been extensively utilized in credit evaluation, medical system and so on. However, with the development of big data era, the existing traditional PSI cannot meet the application requirements in terms of performance and scalability. In this work, we proposed two secure and effective PSI (SE-PSI) protocols on scalable datasets by leveraging deterministic encryption and Bloom Filter. Specially, our first protocol focuses on high efficiency and is secure under a semi-honest server, while the second protocol achieves security on an economic-driven malicious server and hides the set/intersection size to the server. With experimental evaluation, our two protocols need only around 15 and 24 seconds respectively over one million-element datasets. Moreover, as a novelty, a multi-round mechanism is proposed for the two protocols to improve the efficiency. The implementation demonstrates that our two-round mechanism can enhance efficiency by almost twice than two basic protocols.

    Citation: Shuo Qiu, Zheng Zhang, Yanan Liu, Hao Yan, Yuan Cheng. SE-PSI: Fog/Cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom Filter[J]. Mathematical Biosciences and Engineering, 2022, 19(2): 1861-1876. doi: 10.3934/mbe.2022087

    Related Papers:

    [1] Shuai Xi . A Kato-type criterion for the inviscid limit of the nonhomogeneous NS equations with no-slip boundary condition. Communications in Analysis and Mechanics, 2024, 16(4): 896-909. doi: 10.3934/cam.2024039
    [2] Shu Wang . Global well-posedness and viscosity vanishing limit of a new initial-boundary value problem on two/three-dimensional incompressible Navier-Stokes equations and/or Boussinesq equations. Communications in Analysis and Mechanics, 2025, 17(2): 582-605. doi: 10.3934/cam.2025023
    [3] Hongxia Lin, Sabana, Qing Sun, Ruiqi You, Xiaochuan Guo . The stability and decay of 2D incompressible Boussinesq equation with partial vertical dissipation. Communications in Analysis and Mechanics, 2025, 17(1): 100-127. doi: 10.3934/cam.2025005
    [4] Panyu Deng, Jun Zheng, Guchuan Zhu . Well-posedness and stability for a nonlinear Euler-Bernoulli beam equation. Communications in Analysis and Mechanics, 2024, 16(1): 193-216. doi: 10.3934/cam.2024009
    [5] Farrukh Dekhkonov . On one boundary control problem for a pseudo-parabolic equation in a two-dimensional domain. Communications in Analysis and Mechanics, 2025, 17(1): 1-14. doi: 10.3934/cam.2025001
    [6] Shuyue Ma, Jiawei Sun, Huimin Yu . Global existence and stability of temporal periodic solution to non-isentropic compressible Euler equations with a source term. Communications in Analysis and Mechanics, 2023, 15(2): 245-266. doi: 10.3934/cam.2023013
    [7] Farrukh Dekhkonov . On a boundary control problem for a pseudo-parabolic equation. Communications in Analysis and Mechanics, 2023, 15(2): 289-299. doi: 10.3934/cam.2023015
    [8] Yonghui Zou . Global regularity of solutions to the 2D steady compressible Prandtl equations. Communications in Analysis and Mechanics, 2023, 15(4): 695-715. doi: 10.3934/cam.2023034
    [9] Luhan Sun, Zhen Wang, Yabing Wei . A second–order approximation scheme for Caputo–Hadamard derivative and its application in fractional Allen–Cahn equation. Communications in Analysis and Mechanics, 2025, 17(2): 630-661. doi: 10.3934/cam.2025025
    [10] Chang-Jian Wang, Jia-Yue Zhu . Global existence and uniform boundedness to a bi-attraction chemotaxis system with nonlinear indirect signal mechanisms. Communications in Analysis and Mechanics, 2023, 15(4): 743-762. doi: 10.3934/cam.2023036
  • Private Set Intersection (PSI), which is a hot topic in recent years, has been extensively utilized in credit evaluation, medical system and so on. However, with the development of big data era, the existing traditional PSI cannot meet the application requirements in terms of performance and scalability. In this work, we proposed two secure and effective PSI (SE-PSI) protocols on scalable datasets by leveraging deterministic encryption and Bloom Filter. Specially, our first protocol focuses on high efficiency and is secure under a semi-honest server, while the second protocol achieves security on an economic-driven malicious server and hides the set/intersection size to the server. With experimental evaluation, our two protocols need only around 15 and 24 seconds respectively over one million-element datasets. Moreover, as a novelty, a multi-round mechanism is proposed for the two protocols to improve the efficiency. The implementation demonstrates that our two-round mechanism can enhance efficiency by almost twice than two basic protocols.



    Bipolar disorder is a challenging neurological condition that is described by repetitive episodes of depression and mania, involving extreme mood swings that can have a considerable amount of influence on an individual's daily experiences [1]. People suffering from bipolar disorder will encounter periods of intense sadness or depression, as well as periods of heightened mood, known as mania or hypomania [2]. The underlying molecular process contributing to the development and advancement of bipolar disorder remain puzzling. Still, unfolding evidence hints that dysregulation of microRNAs (miRNAs) in bipolar disorder play a key role in the physiopathology of the given disorder. MicroRNAs are non-coding small (approximately 21 nucleotides) [3],[4] RNA molecules that govern gene expression post transcriptionally by binding to mRNA transcripts, and thus either inhibit their translation or promote their degradation. It is well established that miRNAs play crucial roles in the regulation of various biological processes, including metabolism, growth, development, and cell differentiation. These miRNAs are highly conserved across eukaryotic cells and are considered evolutionary ancient genes with a significant importance in gene regulation. RNA polymerase II polymerizes the genes for miRNA, resulting in the production of primary miRNAs (Pri-miRNAs). These Pri-miRNAs are subsequently cleaved by a microprocessor complex within the nucleus, generating stem-loop structures known as precursor miRNAs. Then, the precursor miRNAs are taken to the cytoplasm and are cleaved by DICER to form mature miRNAs; these miRNAs can further modulate gene expression by guiding the RNA-induced silencing complex (RISC) to target mRNAs, thus leading to either their degradation or translational repression. Considering that the human genome contains approximately 1900 miRNA genes, [3] many of which are implicated in human diseases, it is increasingly important to employ appropriate methods to study the expression and regulation of miRNAs in both physiological and pathological contexts.

    Differentially expressed genes (DEGs) are kind of genes whose expression level or read count are significantly different from others between two experimental conditions, such as in a patient and in a healthy person [5]. DEGs play the most important part of clinical and pharmaceutical research, as they can easily help to identify therapeutic targets, biomarkers, and molecular signatures for a particular diagnosis [6]. The identification of DEGs have increased our understanding of bipolar disorder; unfortunately, the treatment has not advanced. Several research studies have used in silico methods to find genes that are differently expressed in bipolar disorder. In a study, a group of genes that were differentially expressed in the prefrontal cortex of people with bipolar disorder were identified using gene expression data from postmortem brain samples [7]. One study showed that lithium is the one of the most commonly used treatments for bipolar disorder [8]. Due to many limitations and a lack of research, the main therapeutic phytochemical that should be used as a drug in bipolar disorder is still not understood [9].

    This research about bipolar disorder, a disease characterized by recurring instances of mania and depression, examines whether the medicinal plant Centella asiatica might prove to be of great help. We performed an in-silico analysis to explore the interaction between microRNAs (miRNAs) and genes that play key roles in bipolar disorder's neural circuitry. MiRNAs, small non-coding RNA molecules who regulate gene expression, are scrutinized for their connections to the disorder's major receptors. This investigation aims to discern whether Centella asiatica could be efficacious to mitigate bipolar disorder's impact by influencing miRNA expression. Our study ties traditional herbal knowledge with modern computational wisdoms, thus presenting a potential channel to evolve our understanding and treatment of bipolar disorder.

    This study uses transcriptomic RNA-sequencing data of patient and control samples. As shown in Figure 1, the Gene Expression Omnibus (GEO) [10], the Sequence Read Archive (SRA) [11], and the PubMed databases from National Center for Biotechnology Information (NCBI) were used for data retrieval as the major platform for the collection of samples and related information.

    Figure 1.  This figure illustrates the complete study pipeline.

    FASTQC was used to check the quality of each sample [12]. FASTQC is a widely used tool for quality control of high-throughput sequencing data; it assesses the quality and composition of sequencing reads in FASTQ files. The input involved utilizing FASTQ files, which were processed and read; the results are presented in the form of plots, except for basic statistics and overrepresented sequences. Low-quality bases, adapters, and unwanted sequences from the sample sequence were removed using Trim Galore and Trimmomatic tools. Trimming improves the data quality, normalizes the read length, mitigates biases, and enhances the accuracy of downstream analyses. FASTQC, Trim Galore, and Trimmomatics were accessed from the GALAXY server [13].

    The reference genome of Homo sapiens (h38) was aligned to all the samples utilized in this study using MiRDeep2 mapper and the Hisat2 tool [14],[15]. MiRdeep2 Mapper utilizes the mapping program Bowtie to perform the alignment and is specifically designed to map miRNA reads to a reference genome and to identify potential miRNA candidates. The hierarchical index of the human genome in HISAT is comprised of 48,000 local Ferragina-Manzini (FM) indexes that represent 64,000bp genomic regions. Once the Alignment was completed, MiRDeep2 quantifier and feature counts were used to count the number of expressed miRNAs and genes in the control and patient samples [16],[17].

    The differentially expressed miRNAs and genes were identified using the DESeq2 package [18]. DESeq2 is a very commonly used package to visualize and differentially analyze the count data by utilizing a negative binomial distribution; moreover, it assesses the relationship between the mean and the variance in the count data, which were obtained through high throughput sequencing assays.

    The downregulated miRNA that was identified earlier was further used for the gene target identification. The gene targets of the miRNAs were identified using TargetScan and DIANA [19]. A popular belief is that miRNA binds to the 3′-UTRs of the targets transcript with the help of complementary base pairing in either one of the two classes of binding patterns. This understanding has led to the development of TargetScan and DIANA.

    The gene target list of differentially expressed miRNA and differentially expressed genes was added to make a vein diagram to identify the differentially miRNA associated genes using Venny [20]. A Venn diagram is a graphical representation that used to identify the list of common genes found in both of the two different spaces; it can also be thought of as a union feature of sets.

    The differentially expressed genes were identified and the mutational variants were discovered using variation viewer, which is a tool that enables the user to search, view, and navigate variations accumulated in ClinVar (Database that stores information about relationship between human health and variations), dbSNPs (Database for Single Nucleotide Polymorphisms), and dbVar (Database of large scale genomic variants) with reference to genomics. The basis of the searches can be the gene name, chromosomal locations, phenotypes, or variant ID of dbVar and dbSNPs; the results can be explored with the help of annotated tables of variations and a dynamic sequence viewer.

    After going through some already published papers on PubMed Central, we identified certain antipsychotic drugs that could act as therapeutics that targeted our associated genes. The compound for Lipinski's Rule of 5 was discovered using Molinspiration [21], which is an online tool to validate for drug likeness, which requires the Smile structure of the phytochemical. For the final selection of our compound, we performed a toxicity check using ProTox II [22].

    To identify the drug binding to all associated miRNA genes, we performed docking using AutoDock 4.2 [23]. AutoDock 4.2 comprehends the binding interactions between a ligand (phytochemical molecule) and a receptor/target (the protein coded by our gene) and uses a Lamarckian genetic algorithm as a search algorithm to reduce the ligand scoring function. Finally, we performed Cygwin for molecular docking and analyzed our potential drug for bipolar disorder.

    The transcriptomic RNA-sequencing sample of patients with bipolar disorder were retrieved from the GEO dataset of the NCBI. The selection of samples was performed under certain criteria, which included the age of the sample (studies should range between 40–55 years old), the species (which should be Homo sapiens in bipolar patients), and the experiment type (which included profiling by high throughput screening); illumine instruments should be preferably used for sequencing, the library source should be a transcriptomic data type, the library selection should include complimentary DNA (cDNA), and the considered disease should be neurological, hence the sample data should also be taken from somewhere within the brain. For the present study, a 2-year time frame between 2016–2018 was considered for data retrieval. Table 1 enlists the GEO datasets taken for the present study.

    Table 1.  Detail of GEO datasets retrieved from NCBI.
    Accession ID Control Samples Patient Samples Tissue type Age Gender Postpartum interval (PMI)
    GSE80336 [24] 2 1 Dorsal striatum Control: 47,55
    Patient: 51
    Female 21.66–35.08
    GSE112523 [25] 12 5 Frontal cortex of human brain Control: 40–54
    Patient: 40–55
    4 Female; 13 Male 9.5–28.3
    GSE78936 [26] 12 16 Brain Control: 41.8 (Average)
    Patient: 47.7 (Average)
    11 Female; 17 Male 30.2–41.9 (Average)

     | Show Table
    DownLoad: CSV

    The DESeq2 package in R was used to identify the DEGs. The criteria established to identify the upregulated DEGs was a p adjusted value less than 0.05 and a log2foldchange greater than 0. The number of upregulated genes obtained after performing the metanalysis (i.e., the data analysis technique) involved combining all the individual studies to produce a combined result; from this, we obtained 327 upregulated DEGs.

    The DESeq2 package in R was used to identify DEGs and miRNAs. MiRNAs with a p adjusted value less than 0.10 and a log2foldchange less than 2 were considered as downregulated miRNAs. The study identified only 1 downregulated miRNA among patients with bipolar disorder, hsa-miR-3960, which had a p-adjusted value of 0.08 and a log2foldchange of −2.98.

    After identifying a differentially expressed miRNA, we obtained 485 gene targets from targetscan and 58 gene targets from the DIANA tool. The total non-duplicate gene targets, which were selected from both DIANA and targetscan, were found to be 489.

    Three common genes between differentially expressed miRNAs and genes identified with the help of a Venn diagram were found to be CITED, NUDT4, and Arl8B, as mentioned in Figure 2. These three genes have been found to play a major role in regulating bipolar disorder.

    Figure 2.  This figure illustrates the use of venn diagram for identifying the commong gene targets of differentially expressed miRNA and differentially expressed genes.

    Variants in the DEGs were identified using Variation Viewer. Those variations that either had a pathogenic or likely pathogenic clinical significance were retrieved from the Variation Viewer database. Most of the mutations that were identified as pathogenic in CITED2, ARL8b, and NUDT4 were copy number variations. The details of the variants and their clinical significance in the gene of interest are listed in Table 2.

    Table 2.  The variant IDs and its clinical significance reported for genes CITED2, ARL8b, and NUDT4.
    S. No. Variant ID Type of variant Clinical significance
    CITED2
    1 nsv3877040 Copy number variation Pathogenic
    2 nsv3879811 Copy number variation Pathogenic
    3 nsv3887898 Copy number variation Pathogenic
    4 nsv3889814 Copy number variation Pathogenic
    5 nsv39199111 Copy number variation Pathogenic
    6 nsv3913689 Copy number variation Pathogenic
    7 nsv3919111 Copy number variation Pathogenic
    8 nsv3913689 Copy number variation Pathogenic
    9 nsv3915150 Copy number variation Pathogenic
    10 nsv3904441 Copy number variation Pathogenic
    11 nsv6112726 Copy number variation Pathogenic
    12 nsv4675250 Copy number variation Pathogenic
    13 nsv3911993 Copy number variation Pathogenic
    14 nsv6314818 Copy number variation Pathogenic
    15 nsv4350212 Copy number variation Pathogenic
    16 nsv3911164 Copy number variation Pathogenic
    17 nsv3916499 Copy number variation Pathogenic
    18 nsv3891146 Copy number variation Pathogenic
    19 rs1583066622 Single nucleotide variant Likely-Pathogenic
    20 rs531316452 Insertion-deletion Pathogenic
    21 rs779637348 Insertion-deletion Pathogenic

    ARL8b
    1 nsv4436544 Copy number variation Likely-Pathogenic
    2 nsv6112759 Copy number variation Pathogenic
    3 nsv3885606 Copy number variation Pathogenic
    4 nsv3880617 Copy number variation Pathogenic
    5 nsv3876280 Copy number variation Pathogenic
    6 nsv3878718 Copy number variation Pathogenic
    7 nsv3879068 Copy number variation Pathogenic
    8 nsv3885461 Copy number variation Pathogenic
    9 nsv3887038 Copy number variation Pathogenic
    10 nsv3887514 Copy number variation Pathogenic
    11 nsv3889023 Copy number variation Pathogenic
    12 nsv3889705 Copy number variation Pathogenic
    13 nsv3895550 Copy number variation Pathogenic

    ARL8b
    14 nsv4674715 Copy number variation Pathogenic
    15 nsv6313525 Copy number variation Pathogenic
    16 nsv3873053 Copy number variation Pathogenic
    17 nsv3875223 Copy number variation Pathogenic

    NUDT4
    nsv3904242 Copy number variation Pathogenic
    nsv3905447 Copy number variation Pathogenic
    nsv3897722 Copy number variation Pathogenic
    nsv3914194 Copy number variation Pathogenic
    nsv3904719 Copy number variation Pathogenic
    nsv4456763 Copy number variation Pathogenic
    nsv3911770 Copy number variation Likely-Pathogenic
    nsv3924338 Copy number variation Pathogenic

     | Show Table
    DownLoad: CSV

    Following an intensive data mining procedure, a few neuroprotective phytochemicals were selected, which went through certain levels of selection, that is, they were finalized if they were found to follow Lipinski's rule of 5 and did not exceed the toxic class IV, thus signifying that they were not harmful if swallowed at concentrations below 300mg/kg. The toxicity class and allowed dosage of the phytochemicals is listed in Table 3 below.

    Table 3.  List of selected Phytochemicals.
    S. No. Compound Source Toxicity class Dosage (mg/kg) Ref.
    1 Arecholine Arecha catechu (supari in India) 4 550 [27]
    2 Leucine Curcubita pepo (pumpkin) 6 10000 [28]
    3 Betaine Beta vulgaris (beetroot) 4 650 [29]
    4 Morin Alliuma cepa (onion) 5 3915 [30]
    5 Anaferine Withania somnifera (ashwagandha) 4 338 [31]
    6 Allicin Allium sativum (Garlic) 4 874 [32]
    7 Curcumin Curcuma longa (Turmeric) 4 2000 [33]
    8 Asiatic acid Centella asiatica (gotu kola) 4 2000 [34]
    9 Ginkgolides A, B, C, J and M Ginko bibloba 4 500 [35]
    10 Sulphoraphanes All cruciferous plants 4 1000 [36]
    11 Atrpohine Hyoscyamine Datura 4 380 [37]
    12 Resveratrol Red grapes 4 1560 [38]
    13 Glycine Glycine max (soybean) 5 3340 [39]
    14 Luteolin Salvia osmarinus (rosemary) 5 3919 [40]
    15 Gallic acid Camellia sinensis (tea plant) 4 2000 [41]
    16 β-asarone Acorus calamus (Sweet flag) 4 418 [42]
    17 α-Cyperone Cyperus rotundus (Nut grass) 4 1720 [43]
    18 Thymoquinone Nigella sativa (Kalonji) 5 2400 [44]
    19 Apegenin Oroxylum indicum 5 2500 [45]
    20 Costunolide Costus speciosus (pushkarmula) 5 3140 [46]
    21 Triterpenoids Abroma augusta 4 664 [47]
    22 Eugenol Centella asiatica (gotu kola) 4 1390 [48]
    23 Scopoletin Aegle marmelos (bael) 5 3800 [49]
    24 α-santalol Santalum album (Sandalwood) 5 3800 [50]

     | Show Table
    DownLoad: CSV

    Molecular docking was performed with the three identified genes as targets and the selected phytochemicals as ligands; the finalized compound that had the highest binding energy will all three of our gene/targets was found to be Asiatic acid. This signifies that this ligand can serve as the best possible phytochemical among this given list for managing bipolar disorder. The interactions of the molecular docking complex were visualized using the Discovery Studio Visualizer [51]. The binding energy of the phytochemicals with the protein receptor is given in Table 4 below. The results are shown in Figures 35 below.

    Table 4.  List of binding energy of the selected ligands with 3 of our associated genes.
    S. No. Ligand name CITED2 target binding energy (kcal/mol) ARL8B target binding energy (kcal/mol) NUDT4 target binding energy (kcal/mol)
    1. α-cyperone −6.79 −5.55 −5.98
    2. α-santalol −5.95 −5.33 −4.67
    3. Allicin −3.75 −3.86 −3.66
    4. Anaferine −4.41 −7.42 −6.42
    5. Apigenin −4.48 −5.51 −5.92
    6. Arecholine −4.83 −5.90 −5.02
    7. Asiatic acid −7.10 −6.96 −9.22
    8. β-asarone −6.28 −4.46 −4.86
    9. Betaine −3.64 −4.19 −3.14
    10. Costunolide −7.76 −7.09 −6.63
    11. Curcumin −3.72 −5.19 −4.66
    12. Eugenol −3.91 −4.39 −4.47
    13. Gallic acid −5.32 −6.25 −5.66
    14. Ginkgolides A, B, C, J and M −5.92 −7.91 −6.42
    15. Glycine −4.95 −4.14 −4.27
    16. Atropine −4.91 −7.06 −6.56
    17. Leucine −3.47 −5.05 −3.78
    18. Luteolin −6.27 −5.93 −5.85
    19. Morin −6.60 −5.35 −4.82
    20. Resveratrol −5.45 −6.25 −5.02
    21. Scopoletin −5.44 −5.41 −5.23
    22. Sulphoraphanes −3.75 −4.60 −4.47
    23. Thymoquinone −5.40 −5.29 −4.97
    24. Triterpenoids −7.02 −7.23 −7.39

     | Show Table
    DownLoad: CSV
    Figure 3.  The 2D and 3D visualization of molecular docking interactions of receptors CITED2 with ligand Asiatic acid.
    Figure 4.  The 2D and 3D visualization of molecular docking interactions of receptors ARL8B with ligand Asiatic acid.
    Figure 5.  The 2D and 3D visualization of molecular docking interactions of receptors NUDT4 with ligand Asiatic acid.

    Bipolar disorder is a substantial mood disorder that has a notable impact on both psychosocial and economic aspects. Despite being more prevalent than previously believed, it has received comparatively less research attention compared to disorders such as schizophrenia and major depression. There has been a growing need to focus on this disorder, as the global lifetime prevalence rate of bipolar disorder lies well within the range of 1.4–6.4% [52]; moreover, it is an incapacitating condition with substantial risk of mortality, presenting a 20 times greater suicide risk than the normal unaffected population [53].

    Previous studies have fascinatingly revealed the key role of hsa-mir-3960 in amyotrophic lateral sclerosis (ALS) patients, which is a neurodegenerative disorder in which a patient gradually loses control over voluntary muscles [54]; the primary etiology of this disease has still not been discovered, but can be associated with neuronal degeneration. In this study, hsa-mir-3960 has emerged as the sole downregulated miRNA when the metanalysis was performed. Therefore, hsa-mir-3960 appears to play a key role in neuronal degradation.

    This study revealed three miRNA-associated genes: CITED2, NUDT4, and Arl8B. A subsequently analysis disclosed CITED2's substantial role in governing neocortical layer II/III formation, the development of somatosensory callosal sensory projection neurons [55], and its involvement in neuroinflammation [56]. Additionally, this study highlights the pivotal role of neuroinflammation in mood-related disorders such as bipolar disorder. Moreover, CITED2 was found to minimize the pathogenic responses of innate immune cells by moderating a broad spectrum of inflammatory genes in macrophages, thus offering protection against harmful inflammation [57]. Arl8B emerged as a key regulator in neuronal connectivity, thereby directing axon branch positioning through the spatial control of autophagy [58] and impacting the mobility of lysosomes [59]. Most interesting, Arl8B has been identified as a novel biomarker for Alzheimer's disease [60]. NUDT4, or nudix hydrolase 4, regulates the degradation of diphosphoinositol polyphosphates, which are high-energy molecules [61]; on this note, a captivating study has suggested that targeting the enzyme responsible for dephosphorylating diphosphoinositol polyphosphates could serve as a novel therapeutic strategy for bipolar disorder, which potentially involves lithium therapy [62].

    Through molecular docking of the three identified genes, the neuroprotective antipsychotic drug was finally found to be Asiatic acid, which is one of the main components of Centella Asiatic. Its chemical formula is pentacyclic triterpenoid, C30H48O5, and its molecular weight is 488.70kD [63]. It is a medicinal plant which was culturally used to improve memory and learning [64]; additionally, it promotes nerve growth and dendric branching [65] and is involved in protecting neurons from oxidative stress [66]. A study supported our results by pointing out the role of Asiatic acid in preventing cognitive defects with the help of the preservation of synaptic and mitochondrial function [67]; Several studies in the past have also mentioned the effect of mitochondrial dysfunction as a cause of bipolar disorder [68]. Asiatic acid is helpful to prevent oxidative stress and apoptosis by restraining the movement of α-synuclein into the mitochondria [69]. This actively plays a key role as a neuroprotectant in cerebral ischemia [70].

    In conclusion, this computational analysis provides a promising avenue for a therapeutic breakthrough in the vast field of bipolar disorder by exploring miRNA-correlated DEGs. This study underlines 3 notable genes, namely CITED2, NUDT4, and Arl8B, as significant regulators, thus implying the multifaceted therapeutic role of Asiatic acid in managing bipolar disorder. These findings extend promising prospects for targeted therapies to manage bipolar disorder.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.



    [1] Q. Tang, Public key encryption supporting plaintext equality test and user-specified authorization, Secur. Commun. Networks, 5 (2012), 1351–1362. doi: 10.1002/sec.418. doi: 10.1002/sec.418
    [2] D. Kales, C. Rechberger, T. Schneider, M. Senker, C. Weinert, Mobile private contact discovery at scale, in 28th USENIX Security Symposium (USENIX Security 19), (2019), 1447–1464.
    [3] P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti, G. Tsudik, Countering gattaca: Efficient and secure testing of fully-sequenced human genomes, in Proceedings of the 18th ACM Conference on Computer and Communications Security, (2011), 697–702. doi: 10.1145/2046707.2046785.
    [4] M. Ion, B. Kreuter, E. Nergiz, S. Patel, S. Saxena, K. Seth, et al., Private intersection-sum protocol with applications to attributing aggregate ad conversions, IACR Cryptol. ePrint Arch., (2017), 738.
    [5] E. D. Cristofaro, G. Tsudik, Practical private set intersection protocols with linear complexity, Lect. Notes Comput. Sci., 6052 (2010), 143–159. doi: 10.1007/978-3-642-14577-3_13. doi: 10.1007/978-3-642-14577-3_13
    [6] C. Dong, L. Chen, Z. Wen, When private set intersection meets big data: An efficient and scalable protocol, in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, (2013), 789–800. doi: 10.1145/2508859.2516701.
    [7] S. Qiu, J. Liu, Y. Shi, Identity-based symmetric private set intersection, Wuhan Univ. J. Nat. Sci., 19 (2014), 426–432. doi: 10.1007/s11859-014-1035-z. doi: 10.1007/s11859-014-1035-z
    [8] B. Pinkas, M. Rosulek, N. Trieu, A. Yanai, Spot-light: Lightweight private set intersection from sparse ot extension, Annu. Int. Cryptology Conf., (2019), 401–431. doi: 10.1007/978-3-030-26954-8_13.
    [9] M. Chase, P. Miao, Private set intersection in the internet setting from lightweight oblivious prf, Lect. Notes Comput. Sci., Springer, 12172 (2020), 34–63. doi: 10.1007/978-3-030-56877-1_2.
    [10] S. Kamara, P. Mohassel, M. Raykova, S. Sadeghian, Scaling private set intersection to billion-element sets, Financ. Cryptography Data Secur., 8437 (2014), 195–215. doi: 10.1007/978-3-662-45472-5_13. doi: 10.1007/978-3-662-45472-5_13
    [11] E. Zhang, F. Li, B. Niu, Y. Wang, Server-aided private set intersection based on reputation, Inf. Sci., 387 (2017), 180–194. doi: 10.1016/j.ins.2016.09.056. doi: 10.1016/j.ins.2016.09.056
    [12] H. Liu, H. Zhang, L. Guo, J. Yu, J. Lin, Privacy-preserving cloud-aided broad learning system, Comput. Secur., 112 (2022), 102503. doi: 10.1016/j.cose.2021.102503. doi: 10.1016/j.cose.2021.102503
    [13] T. Wang, J. Zhou, X. Chen, G. Wang, A. Liu, Y. Liu, A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing, in IEEE Transactions on Emerging Topics in Computational Intelligence, 2 (2018), 3–12. doi: 10.1109/TETCI.2017.2764109.
    [14] H. Zhang, J. Yu, C. Tian, G. Xu, J. Lin, Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things, IEEE Int. Things J., 7 (2020), 2968–2981. doi: 10.1109/JIOT.2020.2964015. doi: 10.1109/JIOT.2020.2964015
    [15] H. Zhang, J. Yu, M. S. Obaidat, P. Vijayakumar, R. Hao, Secure edge-aided computations for social internet-of-things systems, IEEE Trans. Comput. Soc. Syst., (2020), 1–12. doi: 10.1109/TCSS.2020.3030904.
    [16] A. Abadi, S. Terzis, C. Dong, Feather: lightweight multi-party updatable delegated private set intersection, IACR Cryptol. ePrint Arch, 2021.
    [17] A. Abadi, S. Terzis, R. Metere, C. Dong, Efficient delegated private set intersection on outsourced private datasets, IEEE Trans. Dependable Secure Comput., 16 (2017), 608–624. doi: 10.1109/TDSC.2017.2708710. doi: 10.1109/TDSC.2017.2708710
    [18] A. Kavousi, J. Mohajeri, M. Salmasizadeh, Improved secure efficient delegated private set intersection, in 2020 28th Iranian Conference on Electrical Engineering, (2020), 1–6. doi: 10.1109/ICEE50131.2020.9260663.
    [19] L. Tajan, D. Westhoff, F. Armknecht, Private set relations with bloom filters for outsourced sla validation, IACR Cryptol. ePrint Arch., (2019), 993.
    [20] M. J. Freedman, K. Nissim, B. Pinkas, Efficient private matching and set intersection, Lect. Notes Comput. Sci., 3027 (2004), 1–19. doi: 10.1007/978-3-540-24676-3_1. doi: 10.1007/978-3-540-24676-3_1
    [21] S. Ghosh, M. Simkin, The communication complexity of threshold private set intersection, Lect. Notes Comput. Sci., 11693 (2019), 3–29. doi: 10.1007/978-3-030-26951-7_1. doi: 10.1007/978-3-030-26951-7_1
    [22] C. Hazay, Oblivious polynomial evaluation and secure set-intersection from algebraic prfs, J. Cryptol., 31 (2018), 537–586. doi: 10.1007/s00145-017-9263-y. doi: 10.1007/s00145-017-9263-y
    [23] A. Kavousi, J. Mohajeri, M. Salmasizadeh, Efficient scalable multi-party private set intersection using oblivious prf., Secur. Trust Manage., (2021), 81–99. doi: 10.1007/978-3-030-91859-0_5.
    [24] P. Rindal, M. Rosulek, Improved private set intersection against malicious adversaries, in Annual International Conference on the Theory and Applications of Cryptographic Techniques, (2017), 235–259. doi: 10.1007/978-3-319-56620-7_9.
    [25] B. Pinkas, T. Schneider, O. Tkachenko, A. Yanai, Efficient circuit-based psi with linear communication, in Annual International Conference on the Theory and Applications of Cryptographic Techniques, (2019), 122–153. doi: 10.1007/978-3-030-17659-4_5.
    [26] B. Pinkas, T. Schneider, C. Weinert, U. Wieder, Efficient circuit-based psi via cuckoo hashing, in Annual International Conference on the Theory and Applications of Cryptographic Techniques, (2018), 125–157. doi: 10.1007/978-3-319-78372-7_5.
    [27] M. Ciampi, C. Orlandi, Combining private set-intersection with secure two-party computation, Lect. Notes Comput. Sci., Springer, 11035 (2018), 464–482. doi: 10.1007/978-3-319-98113-0_25.
    [28] G. Garimella, B. Pinkas, M. Rosulek, N. Trieu, A. Yanai, Oblivious key-value stores and amplification for private set intersection, Lect. Notes Comput. Sci., 12826 (2021), 395–425. doi: 10.1007/978-3-030-84245-1_14. doi: 10.1007/978-3-030-84245-1_14
    [29] B. Pinkas, T. Schneider, M. Zohner, Scalable private set intersection based on ot extension, ACM Trans. Priv. Secur., 21 (2018), 1–35. doi: 10.1145/3154794. doi: 10.1145/3154794
    [30] M. Ali, J. Mohajeri, M. R. Sadeghi, X. Liu, Attribute-based fine-grained access control for outscored private set intersection computation, Inf. Sci., 536 (2020), 222–243. doi: 10.1016/j.ins.2020.05.041. doi: 10.1016/j.ins.2020.05.041
    [31] C. Dong, L. Chen, J. Camenisch, G. Russello, Fair private set intersection with a semi-trusted arbiter, Lect. Notes Comput. Sci., 7964 (2013), 128–144. doi: 10.1007/978-3-642-39256-6_9. doi: 10.1007/978-3-642-39256-6_9
    [32] H. Chen, K. Laine, P. Rindal, Fast private set intersection from homomorphic encryption, in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (2017), 1243–1255. doi: 10.1145/3133956.3134061.
    [33] S. K. Debnath, R. Dutta, Secure and efficient private set intersection cardinality using bloom filter, Lect. Notes Comput. Sci., Springer, 9290 (2015), 209–226. doi: 10.1007/978-3-319-23318-5_12.
    [34] D. Stritzl, Privacy-Preserving Matching Using Bloom Filters: An Analysis And An Encrypted Variant, Master's thesis, University of Twente, 2019.
    [35] H. Carter, B. Mood, P. Traynor, K. Butler, Outsourcing secure two-party computation as a black box, 2016. doi: 10.1002/sec.1486.
    [36] O. Goldreich, Foundations of cryptography: volume 2, basic applications, Cambridge University Press, 2004.
    [37] J. Katz, Y. Lindell, Introduction to Modern Cryptography, CRC Press, 2007.
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2383) PDF downloads(70) Cited by(2)

Figures and Tables

Figures(5)  /  Tables(3)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog