Research Article
Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds
| Notations | Descriptions |
| | The bifurcation parameter of the logistic map function. | | The iteration number of the logistic map function. | | The constraint factor where | | The logistic mapping function. | | A plaintext data item of DO. | | The key of a symmetric encryption which is only owned by DO. | | The encryption function where x is the input plaintext data and k is a key. | | A secure data pair after data preprocessing on , , where and are the corresponding encrypted data and logistic mapping codes of . |
|
|