Research Article

Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties

Figure 7

The running time of the key generation algorithm and the evaluation algorithm based on the key dimension.