Research Article
Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties
| Input: the ciphertext of the message with the original public key , the decryption circuit of the original encryption, and the target key | | Output: the ciphertext of the message ms. | | (1) | compute: | | (2) | end | | (3) | return |
|