Research Article
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing
| Input: Alice: | | Bob: . | | Begin: Alice: | | (a) Pick random numbers | | (b) Compute | | (c) Compute | | (d) Send to Bob | | Bob: | | (a) Decrypt | | (b) Decrypt | | (c) Compute | | (d) Compute | | (e) Send to Alice | | Alice: | | (a) Compute | | | | Output: |
|