Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2021
/
Article
/
Tab 3
/
Research Article
Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties
Table 3
The running time of the key generation algorithm and the evaluation algorithm based on the key dimension.
Key bit-length
KeyGen (s)
Evaluation (s)
Training (s)
2048 bits
40
31
31.8
8192 bits
480
180
180.8