Research Article
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing
| Input: Alice: | | Bob: | | Begin: Alice: | | (a) Pick a random number | | (b) Compute | | (c) Send to Bob | | Bob: | | (a) Decrypt | | (b) Compute | | (c) Send to Alice | | Alice | | (a) Compute | | Output: |
|