Research Article

Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication

Figure 3

Time cost of different problem sizes () when [24].