Research Article

Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing

Algorithm 2

SCT protocol.
Input: Alice:
 Bob:
Begin: Alice:
  (a) Pick a random number
  (b) Compute
  (c) Send to Bob
 Bob:
  (a) Decrypt
  (b) Compute
  (c) Send to Alice
 Alice
  (a) Compute
Output: