Research Article

Security Analysis of Intelligent System Based on Edge Computing

Figure 6

Identity authentication process of privacy preserving scheme based on secret sharing homomorphism.