Research Article
Privacy-Preserving Restricted Boltzmann Machine
Algorithm 2
Securely computing the product of two integers [
12].
| Initialize | | Step 1. | | Party first generates a random number and computes for each , is the possible input of Party . | | Then define , is the plain text. Then Party encrypts each | | using ElGamal scheme and gets , where each is a new random number. | | After that, Party sends each to Party in the increasing order of . | | Step 2. | | Party picks , rerandomizes it, and sends | | back to Party , where , and is only known to Party . | | Step 3. | | Party partially decrypts and sends the partially decrypted message to Party . | | Step 4. | | Party finally decrypts the message (by doing partial decryption on the already partially decrypted message) | | to get . | | Note that is only known to Party and is only known to Party . Furthermore, . |
|