Research Article
Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption
Table 3
Details of time consumption in key generation.
| ā | Verification (s) | DFTRV/IDFTRV (s) | Communication (s) | Others (s) | FFT/IFFT (s) |
| User | 0.37 | 0.89 | 0.46 | 0.58 | 0 | Smart contract | 0 | 0 | 1.01 | 0 | 0 | Computational nodes | 0 | 0 | 0.52 | 0 | 0.19 |
|
|