International audienceMatrix multiplication is a mathematical brick for solving many real life problems. We consider the Strassen-Winograd algorithm (SW), one of the most efficient matrix multiplication algorithms. Our first contribution is to redesign SW with the MapReduce programming model that allows to process big data sets in parallel on a cluster. Moreover, our main contribution is to address the inherent security and privacy concerns that occur when outsourcing data to a public cloud. We propose a secure approach of SW with MapReduce called S2M3, for Secure Strassen-Winograd Matrix Multiplication with MapReduce. We prove the security of our protocol in a standard security model and provide a proof-of-concept empirical evaluation sug...
Large matrix multiplications commonly take place in large-scale machine-learning applications. Often...
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more...
International audienceWith the emergence of cloud computing services, computationally weak devices (...
International audienceMatrix multiplication is a mathematical brick for solving many real life probl...
International audienceMapReduce is one of the most popular distributed programming paradigms that al...
International audienceThe MapReduce programming paradigm allows to process big data sets in parallel...
International audienceThis paper presents a secure multiparty computation protocol for the Strassen-...
Matrix Multiplication is a basic engineering and scientific problem, which has application in variou...
Funding Information: This work has been supported by the Academy of Finland, under Grants No. 318937...
Computing on data in a manner that preserve the privacy is of growing importance. Multi-Party Comput...
With the prevalence of cloud computing, the resource constrained clients are trended to outsource th...
With the growing popularity of cloud computing, outsourced computing has attracted much research eff...
We consider the problem of secure distributed matrix multiplication (SDMM). Coded computation has be...
Outsourcing heavy computational tasks to remote cloud server, which accordingly significantly reduce...
Abstract. With the emergence of cloud computing services, a resource-constrained client can outsourc...
Large matrix multiplications commonly take place in large-scale machine-learning applications. Often...
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more...
International audienceWith the emergence of cloud computing services, computationally weak devices (...
International audienceMatrix multiplication is a mathematical brick for solving many real life probl...
International audienceMapReduce is one of the most popular distributed programming paradigms that al...
International audienceThe MapReduce programming paradigm allows to process big data sets in parallel...
International audienceThis paper presents a secure multiparty computation protocol for the Strassen-...
Matrix Multiplication is a basic engineering and scientific problem, which has application in variou...
Funding Information: This work has been supported by the Academy of Finland, under Grants No. 318937...
Computing on data in a manner that preserve the privacy is of growing importance. Multi-Party Comput...
With the prevalence of cloud computing, the resource constrained clients are trended to outsource th...
With the growing popularity of cloud computing, outsourced computing has attracted much research eff...
We consider the problem of secure distributed matrix multiplication (SDMM). Coded computation has be...
Outsourcing heavy computational tasks to remote cloud server, which accordingly significantly reduce...
Abstract. With the emergence of cloud computing services, a resource-constrained client can outsourc...
Large matrix multiplications commonly take place in large-scale machine-learning applications. Often...
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more...
International audienceWith the emergence of cloud computing services, computationally weak devices (...