N. Bermeo, "On democratic backsliding, " Journal of Democracy, vol. 27, no. 1, pp. 5-19, 2016.
R. Wike and S. Schumacher, "Democratic rights popular globally but commitment to them not always strong, " Pew Research Center, 2020. [Online]. Available: Https://www. pewresearch. org/global/2020/02/27/democratic-rightspopular-globally-but-commitment-to-them-not-always-strong/
M. Brabant, "Homomorphic encryption for privacy-friendly augmented democracy, " Master's thesis, UCL-Ecole polytechnique de Louvain, 2021, prom. : Pereira, Olivier; Méaux, Pierrick.
M. Veale, R. Binns, and L. Edwards, "Algorithms that remember: Model inversion attacks and data protection law, " Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 376, no. 2133, p. 20180083, 2018.
L. Zhu and S. Han, "Deep leakage from gradients, " in Federated Learning. Springer, 2020, pp. 17-31.
M. Barreno, B. Nelson, A. D. Joseph, and J. D. Tygar, "The security of machine learning, " Machine Learning, vol. 81, no. 2, pp. 121-148, 2010.
C. Gentry, "Computing arbitrary functions of encrypted data, " vol. 53, no. 3, pp. 97-105. [Online]. Available: Https://dl. Acm. org/doi/10. 1145/1666420. 1666444
Y. Shi, M. Larson, and A. Hanjalic, "Collaborative filtering beyond the user-item matrix: A survey of the state of the art and future challenges, " vol. 47, no. 1, pp. 3:1-3:45. [Online]. Available: Https://doi. org/10. 1145/2556270
J. Konecný, H. B. McMahan, F. X. Yu, P. Richtarik, A. T. Suresh, and D. Bacon, "Federated learning: Strategies for improving communication efficiency, " in NIPS Workshop on Private Multi-Party Machine Learning, 2016. [Online]. Available: Https://arxiv. org/abs/1610. 05492
A. Bilge, C. Kaleli, I. Yakut, I. Gunes, and H. Polat, "A survey of privacy-preserving collaborative filtering schemes, " International Journal of Software Engineering and Knowledge Engineering, vol. 23, no. 08, pp. 1085-1108, 2013.
J. Kim, D. Koo, Y. Kim, H. Yoon, J. Shin, and S. Kim, "Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption, " ACM Transactions on Privacy and Security (TOPS), vol. 21, no. 4, pp. 1-30, 2018.
J. S. Fishkin, When the people speak: Deliberative democracy and public consultation. Oxford University Press, 2011.
L. Bottou and O. Bousquet, The Tradeoffs of Large Scale Learning., vol. 20, journal Abbreviation: Optimization for Machine Learning Publication Title: Optimization for Machine Learning.
I. Giacomelli, S. Jha, M. Joye, C. D. Page, and K. Yoon, "Privacypreserving ridge regression with only linearly-homomorphic encryption, " in International Conference on Applied Cryptography and Network Security. Springer, 2018, pp. 243-261.
V. Lyubashevsky, C. Peikert, and O. Regev, "On ideal lattices and learning with errors over rings, " in Advances in Cryptology-EUROCRYPT 2010, ser. Lecture Notes in Computer Science, H. Gilbert, Ed. Springer, pp. 1-23.
J. Katz and Y. Lindell, Introduction to modern cryptography. CRC press.
L. Sweeney, "Weaving technology and policy together to maintain confidentiality, " The Journal of Law, Medicine & Ethics, vol. 25, no. 2-3, pp. 98-110, 1997.
J. H. Cheon, A. Kim, M. Kim, and Y. Song, "Homomorphic encryption for arithmetic of approximate numbers, " in Advances in Cryptology-ASIACRYPT 2017, T. Takagi and T. Peyrin, Eds. Springer International Publishing, pp. 409-437.
K. Han, S. Hong, J. H. Cheon, and D. Park, "Efficient logistic regression on large encrypted data. " IACR Cryptol. ePrint Arch., vol. 2018, p. 662, 2018.
P. Mohassel and Y. Zhang, "SecureML: A system for scalable privacypreserving machine learning, " in 2017 IEEE Symposium on Security and Privacy (SP), pp. 19-38, ISSN: 2375-1207.
S. Erabelli, "pyFHE-a python library for fully homomorphic encryption, " accepted: 2021-01-06T18:34:28Z Journal Abbreviation: Python library for fully homomorphic encryption. [Online]. Available: Https://dspace. mit. edu/handle/1721. 1/129204
J. H. Cheon, K. Han, A. Kim, M. Kim, and Y. Song, "Bootstrapping for approximate homomorphic encryption, " in Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 2018, pp. 360-384.