Research Article

Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties

Figure 5

The running time in the encryption algorithm.