Research Article

Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing

Algorithm 3

SM protocol.
Input: Alice:
 Bob: .
Begin: Alice:
  (a) Pick random numbers
  (b) Compute
  (c) Compute
  (d) Send to Bob
 Bob:
  (a) Decrypt
  (b) Decrypt
  (c) Compute
  (d) Compute
  (e) Send to Alice
 Alice:
  (a) Compute
  
Output: