Security and Communication Networks / 2020 / Article / Alg 5

Research Article

Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing

Algorithm 5

SDC protocol..
Input: Alice:
 Bob:
Begin: Alice interacts with Bob to compute:
  (a)
  (b)
 Alice:
  (a) Compute
  (b) Compute
  (c) Pick a random number
 Alice interacts with Bob to compute:
  (a)
 Alice:
  (a) Send to Bob
 Bob:
  (a) Decrypt
  (b) If , ; otherwise, randomly choose satisfying ,
  (c) Send to Alice
 Alice:
  (a) If , let ; Otherwise, we have , let
Output:

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.