E. Blass, EPiC: efficient privacy-preserving counting for MapReduce, 2012.

E. Blass, R. D. Pietro, R. Molva, and M. ¨. Onen, PRISM ??? Privacy-Preserving Search in MapReduce, Privacy Enhancing Technologies, pp.180-200, 2012.
DOI : 10.1007/978-3-642-31680-7_10

URL : https://eprint.iacr.org/2011/244.pdf

B. Chor, N. Gilboa, and M. Naor, Private information retrieval by keywords, IACR Cryptology ePrint Archive, issue.3, 1998.

J. Dean and S. Ghemawat, MapReduce, OSDI, pp.137-150, 2004.
DOI : 10.1145/1327452.1327492

S. Dolev, N. Gilboa, and X. Li, Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation, Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC '15, pp.21-29, 2015.
DOI : 10.1145/359168.359176

S. Dolev and Y. Li, Secret Shared Random Access Machine, IACR Cryptology ePrint Archive, p.292, 2015.
DOI : 10.1007/978-3-319-29919-8_2

S. Dolev, Y. Li, and S. Sharma, Private and secure secret shared MapReduce Available at: https, 2016.
DOI : 10.1007/978-3-319-41483-6_11

F. Emekçi, D. Agrawal, A. Abbadi, and A. Gulbeden, Privacy Preserving Query Processing Using Third Parties, 22nd International Conference on Data Engineering (ICDE'06), p.27, 2006.
DOI : 10.1109/ICDE.2006.116

F. Emekçi, A. Metwally, D. Agrawal, and A. Abbadi, Dividing secrets to secure data outsourcing, Information Sciences, vol.263, pp.198-210, 2014.
DOI : 10.1016/j.ins.2013.10.006

L. Li, M. Militzer, and A. Datta, rPIR: ramp secret sharing-based communication-efficient private information retrieval, International Journal of Information Security, vol.92, issue.6, p.44, 2014.
DOI : 10.1109/P2P.2010.5569988

URL : https://eprint.iacr.org/2014/044.pdf

W. Lueks and I. Goldberg, Sublinear Scaling for Multi-Client Private Information Retrieval, FC, pp.168-186, 2015.
DOI : 10.1007/978-3-662-47854-7_10

URL : http://cacr.uwaterloo.ca/techreports/2014/cacr2014-19.pdf

T. Mayberry, E. Blass, and A. H. Chan, PIRMAP: Efficient Private Information Retrieval for MapReduce, FC, pp.371-385, 2013.
DOI : 10.1007/978-3-642-39884-1_32

R. C. Merkle, A Digital Signature Based on a Conventional Encryption Function, CRYPTO, pp.369-378, 1987.
DOI : 10.1007/3-540-48184-2_32

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

J. J. Stephen, S. Savvides, R. Seidel, and P. Eugster, Practical confidentiality preserving big data analysis, HotCloud, 2014.

S. D. Tetali, M. Lesani, R. Majumdar, and T. D. Millstein, MrCrypt: static analysis for secure cloud computations, OOPSLA, pp.271-286, 2013.