Blass, E., Pietro, R. D., Molva, R., and
¨
Onen, M. (2012).
PRISM - privacy-preserving search in mapreduce. In
Privacy Enhancing Technologies Symposium, PETS.
Bultel, X., Ciucanu, R., Giraud, M., and Lafourcade, P.
(2017). Secure matrix multiplication with mapreduce.
In International Conference on Availability, Reliabil-
ity and Security, ARES.
Chartrand, G. (1985). Introductory Graph Theory. Dover.
Ciucanu, R., Giraud, M., Lafourcade, P., and Ye, L. (2018).
Secure Grouping and Aggregation with MapReduce.
In International Joint Conference on e-Business and
Telecommunications, SECRYPT.
Cramer, R., Damg
˚
ard, I., and Nielsen, J. B. (2001). Mul-
tiparty Computation from Threshold Homomorphic
Encryption. In EUROCRYPT, International Confer-
ence on the Theory and Application of Cryptographic
Techniques.
Damg
˚
ard, I. and Jurik, M. (2001). A generalisation, a sim-
plification and some applications of paillier’s proba-
bilistic public-key system. In International Workshop
on Practice and Theory in Public Key Cryptography:
Public Key Cryptography, PKC.
Dean, J. and Ghemawat, S. (2004). Mapreduce: Simplified
data processing on large clusters. In 6th Symposium on
Operating System Design and Implementation, OSDI.
Derbeko, P., Dolev, S., Gudes, E., and Sharma, S. (2016).
Security and privacy aspects in mapreduce on clouds:
A survey. Computer Science Review, 20.
Dolev, S., Li, Y., and Sharma, S. (2016). Private and se-
cure secret shared mapreduce (extended abstract) -
(extended abstract). In Data and Applications Secu-
rity and Privacy XXX - 30th Annual IFIP.
Du, W. and Atallah, M. J. (2001). Privacy-Preserving Co-
operative Statistical Analysis. In Annual Computer
Security Applications Conference ACSAC.
Dumas, J., Lafourcade, P., Orfila, J., and Puys, M. (2016).
Private Multi-party Matrix Multiplication and Trust
Computations. In International Joint Conference on
e-Business and Telecommunications SECRYPT.
Dumas, J., Lafourcade, P., Orfila, J., and Puys, M. (2017).
Dual protocols for private multi-party matrix multipli-
cation and trust computations. Computers & Security,
71.
Gathen, J. v. z. and Gerhard, J. (2013). Modern computer
algebra. Cambridge University Press, 3rd edition.
Huss-Lederman, S., Jacobson, E. M., Johnson, J. R., Tsao,
A., and Turnbull, T. (1996). Implementation of
strassen’s algorithm for matrix multiplication. In
ACM/IEEE Conference on Supercomputing.
Krizhevsky, A., Sutskever, I., and Hinton, G. E. (2012). Im-
agenet classification with deep convolutional neural
networks. In Annual Conference on Neural Informa-
tion Processing Systems.
Le Gall, F. (2014). Powers of tensors and fast matrix mul-
tiplication. In International Symposium on Symbolic
and Algebraic Computation, ISSAC.
Leskovec, J., Rajaraman, A., and Ullman, J. D. (2014). Min-
ing of Massive Datasets, 2nd Ed. Cambridge Univer-
sity Press.
Li, J., Ranka, S., and Sahni, S. (2011). Strassen’s matrix
multiplication on gpus. In IEEE International Con-
ference on Parallel and Distributed Systems, ICPADS.
Ma, Q. and Deng, P. (2008). Secure Multi-party Protocols
for Privacy Preserving Data Mining. In Wireless Algo-
rithms, Systems, and Applications Conference, WASA.
Mayberry, T., Blass, E., and Chan, A. H. (2013). PIRMAP:
efficient private information retrieval for mapreduce.
In Financial Cryptography and Data Security, FC.
Naccache, D. and Stern, J. (1998). A new public key cryp-
tosystem based on higher residues. In Conference on
Computer and Communications Security, CCS.
Okamoto, T. and Uchiyama, S. (1998). A new public-key
cryptosystem as secure as factoring. In EUROCRYPT,
International Conference on the Theory and Applica-
tion of Cryptographic Techniques.
Paillier, P. (1999). Public-key cryptosystems based on com-
posite degree residuosity classes. In EUROCRYPT,
International Conference on the Theory and Applica-
tion of Cryptographic Techniques.
Sako, K. (2011). Goldwasser-micali encryption scheme. In
Encyclopedia of Cryptography and Security, 2nd Ed.
Shoshan, A. and Zwick, U. (1999). All pairs shortest paths
in undirected graphs with integer weights. In 40th
Annual Symposium on Foundations of Computer Sci-
ence, FOCS.
Strassen, V. (1969). Gaussian elimination is not optimal.
Numerische Mathematik, 13(4).
ul Hassan Khan, A., Al-Mouhamed, M., Fatayer, A., and
Nazeeruddin, M. (2016). Optimizing the matrix multi-
plication using strassen and winograd algorithms with
limited recursions on many-core. International Jour-
nal of Parallel Programming, 44(4).
Wang, I.-C., Shen, C.-H., Zhan, J., Hsu, T.-s., Liau, C.-J.,
and Wang, D.-W. (2009). Toward empirical aspects
of secure scalar product. IEEE Transactions on Sys-
tems, Man, and Cybernetics, Part C (Applications and
Reviews), 39(4).
Zwick, U. (1998). All pairs shortest paths in weighted di-
rected graphs exact and almost exact algorithms. In
39th Annual Symposium on Foundations of Computer
Science, FOCS.
Secure Strassen-Winograd Matrix Multiplication with MapReduce
227