Research Article

Privacy-Preserving Collaborative Computation for Human Activity Recognition

Algorithm 1

Secure aggregation algorithm.
for each do
n shares
n shares are equally distributed among m nodes
end for
for eachdo
if client[i] received u shares then
  
   
  Broadcast the share of aggregation results
end if
end for
for each do
if client[i] received d + 1 shares of aggregation results then
  Reconstructing out aggregated results
end if
end for