Research Article

Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties

Figure 6

The running time in the KeyGen algorithm, the encryption algorithm, and the training phase.