Research Article
Privacy-Preserving Restricted Boltzmann Machine
Algorithm 1
Securely computing the sigmoid function [
12].
Initialize | Step 1. | Party first generates a random number and computes for each , is the possible inputs of Party . | We define , is the plain text. Party encrypts each using the ElGamal scheme and gets , | where each is a new random number. Party sends each in the increasing order of . | Step 2. | Party picks , rerandomizes it and sends back to Party , | where , and is only known to Party . | Step 3. | Party partially decrypts and sends the partially decrypted message to Party . | Step 4. | Party finally decrypts the message (by doing partial decryption on the already partially decrypted message) | to get . Note that is only known to Party and is only known to Party . | Furthermore, . |
|