Skip to main content
. 2017 Jan 16;41(3):37. doi: 10.1007/s10916-016-0657-4

Table 1.

Efficiency of [17] and the proposed protocol

[17] Ours
Computational complexity O(n ω 2) P i:O(ω i),O:O(n ω)
Communication overhead O(n ω) P i:O(ω+n),O:O(n ω)
Restriction on set size |S 1|=…=|S n| none
Protected values S i(∀i∈[1,n]) S i,|S i|(∀i∈[1,n])