Research Article
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing
| Input: Alice: | | Bob: | | Begin: Alice interacts with Bob to compute: | | (a) | | (b) | | Alice: | | (a) Compute | | (b) Compute | | (c) Pick a random number | | Alice interacts with Bob to compute: | | (a) | | Alice: | | (a) Send to Bob | | Bob: | | (a) Decrypt | | (b) If , ; otherwise, randomly choose satisfying , | | (c) Send to Alice | | Alice: | | (a) If , let ; Otherwise, we have , let | | Output: |
|