Q3. Privacy-Preserving Computation using Public-Key Cryptography
(Marks: 3+5 = 8) Say, Alice wants to multiply two numbers (M1 and
M2) and send the result to Bob. That is, Alice is the sender and
Bob is the receiver. However, Alice does not have the computation
power to multiply two numbers. Therefore, she decides to send both
numbers to a cloud server. Though the cloud server has the
computation power, it cannot be trusted. As a result, Alice relies
on the Homomorphic...