Research Article

[Retracted] Legal Protection of Artificial Intelligence Data and Algorithms from the Perspective of Internet of Things Resource Sharing

Table 1

Cloud computing privacy protection scheme based on secret sharing.

OperatingSecret distributionShare verificationSecret reconstruction

eˆ calculation2
Hash calculation210
Lagrange interpolation001
Modular exponent operation0

Note: is the number of secret distribution reservations, and is the threshold.