J. Michael, J. Duffy, and . Crown, A personalized approach to cancer treatment: how biomarkers can help, Clinical chemistry, vol.54, issue.11, pp.1770-1779, 2008.

J. Barretina, G. Caponigro, N. Stransky, K. Venkatesan, A. Adam et al., The Cancer Cell Line Encyclopedia enables predictive modelling of anticancer drug sensitivity, Nature, vol.53, issue.7391, pp.483603-607, 2012.
DOI : 10.1002/pbc.20697

J. Mathew, E. J. Garnett, . Edelman, J. Sonja, C. D. Heidorn et al., Systematic identification of genomic markers of drug sensitivity in cancer cells, Nature, issue.7391, pp.483570-575, 2012.

G. David and . Covell, Data mining approaches for genomic biomarker development: Applications using drug screening data from the cancer genome project and the cancer cell line encyclopedia, PloS one, vol.10, issue.7, p.127433, 2015.

I. Sock-jang, E. C. Neto, J. Guinney, H. Stephen, . Friend et al., Systematic assessment of analytical methods for drug sensitivity prediction from cancer cell line data, Pacific Symposium on Biocomputing. Pacific Symposium on Biocomputing, p.63, 2014.

Y. Erlich and A. Narayanan, Routes for breaching and protecting genetic privacy, Nature Reviews Genetics, vol.2008, issue.6, pp.409-421, 2014.
DOI : 10.1371/journal.pgen.1000008

URL : https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4151119/pdf

E. Eric, S. Schadt, K. Woo, and . Hao, Bayesian method to predict individual snp genotypes from gene expression data, Nature genetics, vol.44, issue.5, pp.603-608, 2012.

R. Tibshirani, Regression shrinkage and selection via the lasso, Journal of the Royal Statistical Society. Series B (Methodological), pp.267-288, 1996.
DOI : 10.1111/j.1467-9868.2011.00771.x

J. Friedman, T. Hastie, and R. Tibshirani, glmnet: Lasso and elasticnet regularized generalized linear models, 2009.

H. Zou and T. Hastie, Regularization and variable selection via the elastic net, Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol.5, issue.2, pp.301-320, 2005.
DOI : 10.1073/pnas.201162998

J. Liu, S. Ji, and J. Ye, Slep: Sparse learning with efficient projections, p.491, 2009.

S. Shalev-shwartz and T. Zhang, Accelerated proximal stochastic dual coordinate ascent for regularized loss minimization, ICML, pp.64-72, 2014.
DOI : 10.1023/A:1012498226479

Q. Zhou, W. Chen, S. Song, R. Jacob, . Gardner et al., A reduction of the elastic net to support vector machines with an application to gpu computing, Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015.

K. Lin and M. Chen, Privacy-preserving outsourcing support vector machines with random transformation, Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '10, pp.363-372, 2010.
DOI : 10.1145/1835804.1835852

S. Laur, H. Lipmaa, and T. Mielikäinen, Cryptographically private support vector machines, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '06, pp.618-624, 2006.
DOI : 10.1145/1150402.1150477

T. Tassa, A. Jarrous, and Y. Ben-ya-'akov, Oblivious evaluation of multivariate polynomials, Journal of Mathematical Cryptology, vol.7, issue.1, pp.1-29, 2013.
DOI : 10.1515/jmc-2012-0007

F. Liu, W. K. Ng, and W. Zhang, Encrypted SVM for Outsourced Data Mining, 2015 IEEE 8th International Conference on Cloud Computing, pp.1085-1092, 2015.
DOI : 10.1109/CLOUD.2015.158

H. Yu, X. Jiang, and J. Vaidya, Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data, Proceedings of the 2006 ACM symposium on Applied computing , SAC '06, pp.603-610, 2006.
DOI : 10.1145/1141277.1141415

H. Yu, J. Vaidya, and X. Jiang, Privacy-Preserving SVM Classification on Vertically Partitioned Data, Advances in Knowledge Discovery and Data Mining, pp.647-656, 2006.
DOI : 10.1007/11731139_74

J. Vaidya, H. Yu, and X. Jiang, Privacy-preserving SVM classification, Knowledge and Information Systems, vol.13, issue.4, pp.161-178, 2008.
DOI : 10.3233/JCS-2005-13401

M. Van-dijk and A. Juels, On the impossibility of cryptography alone for privacy-preserving cloud computing. HotSec, pp.1-8, 2010.

S. Sherman, J. Chow, L. Lee, and . Subramanian, Two-party computation model for privacy-preserving queries over distributed databases, NDSS, 2009.

Z. Erkin, T. Veugen, T. Toft, and R. L. Lagendijk, Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing, IEEE transactions on information forensics and security, pp.1053-1066, 2012.
DOI : 10.1109/TIFS.2012.2190726

URL : http://eprints.eemcs.utwente.nl/23717/01/TIFS2012.pdf

D. Demmler, T. Schneider, and M. Zohner, ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation, Proceedings 2015 Network and Distributed System Security Symposium, 2015.
DOI : 10.14722/ndss.2015.23113

Y. Thomas-brochmann-pedersen, E. Sayg?n, and . Sava¸ssava¸s, Secret charing vs. encryption-based techniques for privacy preserving data mining, 2007.

A. López-alt, E. Tromer, and V. Vaikuntanathan, On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption, Proceedings of the 44th symposium on Theory of Computing, STOC '12, pp.1219-1234, 2012.
DOI : 10.1145/2213977.2214086

A. Peter, E. Tews, and S. Katzenbeisser, Efficiently outsourcing multiparty computation under multiple keys. Information Forensics and Security, IEEE Transactions on, vol.8, issue.12, pp.2046-2058, 2013.
DOI : 10.1109/tifs.2013.2288131

B. Wang, M. Li, S. Sherman, H. Chow, and . Li, Computing encrypted cloud data efficiently under multiple keys, Communications and Network Security (CNS), 2013 IEEE Conference on, pp.504-513, 2013.

B. Wang, M. Li, S. Sherman, H. Chow, and . Li, A tale of two clouds: Computing on data encrypted under multiple keys, 2014 IEEE Conference on Communications and Network Security, pp.337-345, 2014.
DOI : 10.1109/CNS.2014.6997502

M. Blaze, G. Bleumer, and M. Strauss, Divertible protocols and atomic proxy cryptography, Advances in CryptologyEUROCRYPT'98, pp.127-144, 1998.
DOI : 10.1007/BFb0054122

D. Catalano and D. Fiore, Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1518-1529, 2015.
DOI : 10.1007/978-3-642-13190-5_2

E. Bresson, D. Catalano, and D. Pointcheval, A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications, Advances in Cryptology-ASIACRYPT 2003, pp.37-54, 2003.
DOI : 10.1007/978-3-540-40061-5_3

URL : http://www.di.ens.fr/users/pointche/Documents/Papers/2003_asiacryptB.pdf

W. Yang, J. Soares, P. Greninger, J. Elena, H. Edelman et al., Genomics of Drug Sensitivity in Cancer (GDSC): a resource for therapeutic biomarker discovery in cancer cells, Nucleic Acids Research, vol.41, issue.D1, pp.41-955, 2013.
DOI : 10.1093/nar/gks1111

M. Jaggi, An equivalence between the lasso and support vector machines. Regularization, Optimization, Kernels, and Support Vector Machines, pp.1-26, 2014.

H. Zhou and G. Wornell, Efficient homomorphic encryption on integer vectors and its applications, 2014 Information Theory and Applications Workshop (ITA), pp.1-9, 2014.
DOI : 10.1109/ITA.2014.6804228

URL : http://ita.ucsd.edu/workshop/14/files/paper/paper_3205.pdf

D. Boneh, E. Goh, and K. Nissim, Evaluating 2-DNF Formulas on Ciphertexts, Theory of Cryptography Conference, pp.325-341, 2005.
DOI : 10.1007/978-3-540-30576-7_18

URL : http://www.iacr.org/cryptodb/archive/2005/TCC/3602/3602.pdf

T. Fushiki, Estimation of prediction error by using K-fold cross-validation, Statistics and Computing, vol.35, issue.3, pp.137-146, 2011.
DOI : 10.1214/009053607000000514

O. Goldreich, Foundations of cryptography, 2004.
DOI : 10.1017/cbo9780511546891

W. K. Wong, D. Wai-lok-cheung, B. Kao, and N. Mamoulis, Secure kNN computation on encrypted databases, Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD '09, pp.139-152, 2009.
DOI : 10.1145/1559845.1559862

S. Halevi and V. Shoup, An implementation of homomorphic encryption. https://github.com/shaih

S. Sathiya-keerthi, O. Chapelle, and D. Decoste, Building support vector machines with reduced classifier complexity, Journal of Machine Learning Research, vol.7, pp.1493-1515, 2006.

. Torben-pryds-pedersen, Non-interactive and information-theoretic secure verifiable secret sharing, Annual International Cryptology Conference, pp.129-140, 1991.

C. Hsieh, K. Chang, C. Lin, S. Keerthi, and . Sundararajan, A dual coordinate descent method for large-scale linear SVM, Proceedings of the 25th international conference on Machine learning, ICML '08, pp.408-415, 2008.
DOI : 10.1145/1390156.1390208

URL : http://www.csie.ntu.edu.tw/~cjlin/papers/cddual.pdf

S. Tyree, R. Jacob, . Gardner, Q. Kilian, K. Weinberger et al., Parallel support vector machines in practice, 2014.

O. Chapelle, Training a Support Vector Machine in the Primal, Neural Computation, vol.6, issue.5, pp.1155-1178, 2007.
DOI : 10.1198/106186005X25619