Research Article

Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption

Algorithm 7

Secure outsourcing of modular exponentiation.
Input:
Output:
(1)The user generates random parameters
(2)and computes
(3)
(4)The user uploads to the smart contract;
(5)The smart contract distributes to 6 computational nodes;
(6)The computational nodes compute after receiving and return results to the smart contract;
(7)The user gets from the smart contract;
(8)The user verifies
(9)If the verification is valid,