Research Article
Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption
Algorithm 7
Secure outsourcing of modular exponentiation.
Input: | Output: | (1) | The user generates random parameters | (2) | and computes | (3) | | (4) | The user uploads to the smart contract; | (5) | The smart contract distributes to 6 computational nodes; | (6) | The computational nodes compute after receiving and return results to the smart contract; | (7) | The user gets from the smart contract; | (8) | The user verifies | (9) | If the verification is valid, |
|