Research Article
Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption
Algorithm 7
Secure outsourcing of modular exponentiation.
| Input: | | Output: | | (1) | The user generates random parameters | | (2) | and computes | | (3) | | | (4) | The user uploads to the smart contract; | | (5) | The smart contract distributes to 6 computational nodes; | | (6) | The computational nodes compute after receiving and return results to the smart contract; | | (7) | The user gets from the smart contract; | | (8) | The user verifies | | (9) | If the verification is valid, |
|