EPiC: efficient privacy-preserving counting for MapReduce, 2012. ,
PRISM ??? Privacy-Preserving Search in MapReduce, Privacy Enhancing Technologies, pp.180-200, 2012. ,
DOI : 10.1007/978-3-642-31680-7_10
URL : https://eprint.iacr.org/2011/244.pdf
Private information retrieval by keywords, IACR Cryptology ePrint Archive, issue.3, 1998. ,
MapReduce, OSDI, pp.137-150, 2004. ,
DOI : 10.1145/1327452.1327492
Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation, Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC '15, pp.21-29, 2015. ,
DOI : 10.1145/359168.359176
Secret Shared Random Access Machine, IACR Cryptology ePrint Archive, p.292, 2015. ,
DOI : 10.1007/978-3-319-29919-8_2
Private and secure secret shared MapReduce Available at: https, 2016. ,
DOI : 10.1007/978-3-319-41483-6_11
Privacy Preserving Query Processing Using Third Parties, 22nd International Conference on Data Engineering (ICDE'06), p.27, 2006. ,
DOI : 10.1109/ICDE.2006.116
Dividing secrets to secure data outsourcing, Information Sciences, vol.263, pp.198-210, 2014. ,
DOI : 10.1016/j.ins.2013.10.006
rPIR: ramp secret sharing-based communication-efficient private information retrieval, International Journal of Information Security, vol.92, issue.6, p.44, 2014. ,
DOI : 10.1109/P2P.2010.5569988
URL : https://eprint.iacr.org/2014/044.pdf
Sublinear Scaling for Multi-Client Private Information Retrieval, FC, pp.168-186, 2015. ,
DOI : 10.1007/978-3-662-47854-7_10
URL : http://cacr.uwaterloo.ca/techreports/2014/cacr2014-19.pdf
PIRMAP: Efficient Private Information Retrieval for MapReduce, FC, pp.371-385, 2013. ,
DOI : 10.1007/978-3-642-39884-1_32
A Digital Signature Based on a Conventional Encryption Function, CRYPTO, pp.369-378, 1987. ,
DOI : 10.1007/3-540-48184-2_32
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Practical confidentiality preserving big data analysis, HotCloud, 2014. ,
MrCrypt: static analysis for secure cloud computations, OOPSLA, pp.271-286, 2013. ,