{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:09:16Z","timestamp":1730318956184,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,29]],"date-time":"2017-08-29T00:00:00Z","timestamp":1503964800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,29]]},"DOI":"10.1145\/3098954.3098989","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T12:12:36Z","timestamp":1502367156000},"page":"1-10","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Secure Matrix Multiplication with MapReduce"],"prefix":"10.1145","author":[{"given":"Xavier","family":"Bultel","sequence":"first","affiliation":[{"name":"Universit\u00e9 Clermont Auvergne & CNRS LIMOS, France"}]},{"given":"Radu","family":"Ciucanu","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Clermont Auvergne & CNRS LIMOS, France"}]},{"given":"Matthieu","family":"Giraud","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Clermont Auvergne & CNRS LIMOS, France"}]},{"given":"Pascal","family":"Lafourcade","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Clermont Auvergne & CNRS LIMOS, France"}]}],"member":"320","published-online":{"date-parts":[[2017,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"209","article-title":"A New Efficient Privacy-Preserving Scalar Product Protocol","volume":"70","author":"Amirbekyan Artak","year":"2007","unstructured":"Artak Amirbekyan and Vladimir Estivill-Castro . 2007 . A New Efficient Privacy-Preserving Scalar Product Protocol . In AusDM (CRPIT) , Vol. 70. 209 -- 214 . Artak Amirbekyan and Vladimir Estivill-Castro. 2007. A New Efficient Privacy-Preserving Scalar Product Protocol. In AusDM (CRPIT), Vol. 70. 209--214.","journal-title":"AusDM (CRPIT)"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"M. Bellare A. Boldyreva and S. Micali. 2000. Public-key encryption in a multi-user setting: Security proofs and improvements. In EUROCRYPT. M. Bellare A. Boldyreva and S. Micali. 2000. Public-key encryption in a multi-user setting: Security proofs and improvements. In EUROCRYPT.","DOI":"10.1007\/3-540-45539-6_18"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_10"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Ronald Cramer Ivan Damg\u00e5rd and Jesper Buus Nielsen. 2001. Multiparty Computation from Threshold Homomorphic Encryption. In EUROCRYPT. 280--299. Ronald Cramer Ivan Damg\u00e5rd and Jesper Buus Nielsen. 2001. Multiparty Computation from Threshold Homomorphic Encryption. In EUROCRYPT. 280--299.","DOI":"10.1007\/3-540-44987-6_18"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"I. Damg\u00e5rd and M. Jurik. 2001. A Generalisation a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In PKC. 119--136. I. Damg\u00e5rd and M. Jurik. 2001. A Generalisation a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In PKC. 119--136.","DOI":"10.1007\/3-540-44586-2_9"},{"key":"e_1_3_2_1_6_1","unstructured":"Jeffrey Dean and Sanjay Ghemawat. 2004. MapReduce: Simplified Data Processing on Large Clusters. In OSDI. 137--150. Jeffrey Dean and Sanjay Ghemawat. 2004. MapReduce: Simplified Data Processing on Large Clusters. In OSDI. 137--150."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2016.05.001"},{"key":"e_1_3_2_1_8_1","first-page":"151","article-title":"Private and Secure Secret Shared MapReduce","volume":"9766","author":"Dolev Shlomi","year":"2016","unstructured":"Shlomi Dolev , Yin Li , and Shantanu Sharma . 2016 . Private and Secure Secret Shared MapReduce . In DBSec , Vol. 9766. 151 -- 160 . Shlomi Dolev, Yin Li, and Shantanu Sharma. 2016. Private and Secure Secret Shared MapReduce. In DBSec, Vol. 9766. 151--160.","journal-title":"DBSec"},{"key":"e_1_3_2_1_9_1","unstructured":"W. Du and M.J. Atallah. 2001. Privacy-preserving cooperative statistical analysis. In ACSAC. 102--110. W. Du and M.J. Atallah. 2001. Privacy-preserving cooperative statistical analysis. In ACSAC. 102--110."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005957200610072"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_12_1","volume-title":"Ullman","author":"Leskovec Jure","year":"2014","unstructured":"Jure Leskovec , Anand Rajaraman , and Jeffrey D . Ullman . 2014 . Mining of Massive Datasets, 2 nd Ed. Cambridge University Press . Jure Leskovec, Anand Rajaraman, and Jeffrey D. Ullman. 2014. Mining of Massive Datasets, 2nd Ed. Cambridge University Press.","edition":"2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88582-5_49"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_32"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288106"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Tatsuaki Okamoto and Shigenori Uchiyama. 1998. A New Public-Key Cryptosystem as Secure as Factoring. In EUROCRYPT. 308--318. Tatsuaki Okamoto and Shigenori Uchiyama. 1998. A New Public-Key Cryptosystem as Secure as Factoring. In EUROCRYPT. 308--318.","DOI":"10.1007\/BFb0054135"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"P. Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In EUROCRYPT. 223--238. P. Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In EUROCRYPT. 223--238.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_3_2_1_18_1","volume-title":"Encyclopedia of Cryptography and Security","author":"Sako Kazue","unstructured":"Kazue Sako . 2011. Goldwasser-Micali Encryption Scheme . In Encyclopedia of Cryptography and Security , 2 nd Ed. 516. Kazue Sako. 2011. Goldwasser-Micali Encryption Scheme. In Encyclopedia of Cryptography and Security, 2nd Ed. 516.","edition":"2"},{"key":"e_1_3_2_1_19_1","first-page":"426","article-title":"EPiC: Efficient Privacy-Preserving Counting for MapReduce","volume":"9466","author":"Vo-Huu Triet D.","year":"2015","unstructured":"Triet D. Vo-Huu , Erik-Oliver Blass , and Guevara Noubir . 2015 . EPiC: Efficient Privacy-Preserving Counting for MapReduce . In NETYS , Vol. 9466. 426 -- 443 . Triet D. Vo-Huu, Erik-Oliver Blass, and Guevara Noubir. 2015. EPiC: Efficient Privacy-Preserving Counting for MapReduce. In NETYS, Vol. 9466. 426--443.","journal-title":"NETYS"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISA.2008.78"}],"event":{"name":"ARES '17: International Conference on Availability, Reliability and Security","acronym":"ARES '17","location":"Reggio Calabria Italy"},"container-title":["Proceedings of the 12th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098954.3098989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T03:42:22Z","timestamp":1673581342000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098954.3098989"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,29]]},"references-count":20,"alternative-id":["10.1145\/3098954.3098989","10.1145\/3098954"],"URL":"https:\/\/doi.org\/10.1145\/3098954.3098989","relation":{},"subject":[],"published":{"date-parts":[[2017,8,29]]},"assertion":[{"value":"2017-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}