Research Article

[Retracted] Legal Protection of Artificial Intelligence Data and Algorithms from the Perspective of Internet of Things Resource Sharing

Table 2

Secret distribution process calculation volume breakdown.

OperatingStep 1: generate secret sharesStep 2: generate shadow secret

eˆ calculation
Hash calculation11
Lagrange interpolation00
Modular exponent operation00

Note: is the number of secret distribution reservations, and is the threshold.