Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud
Abstract: Highlights•This paper proposes a verifiable privacy-preserving ARM scheme.•This scheme stores two weak private keys realizing jointly decryption ciphertext.•The BLS signature scheme verifies data integrity and legitimacy.•The CSP uses adding virtual transactions, permutation, and random number methods.
Loading