Research Article
Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties
Input: the ciphertext of the message with the original public key , the decryption circuit of the original encryption, and the target key | Output: the ciphertext of the message ms. | (1) | compute: | (2) | end | (3) | return |
|