Skip to main content
. Author manuscript; available in PMC: 2019 Aug 11.
Published in final edited form as: Conf Comput Commun Secur. 2018 Oct;2018:1209–1222. doi: 10.1145/3243734.3243837

Table 1:

Comparison of secure d-dimensional matrix multiplication algorithms

Methodology Number of ciphertexts Complexity Required depth
Naive method d2 O(d3) 1 Mult
Halevi-Shoup [25] d O(d2) 1 Mult
Ours 1 O(d) 1 Mult + 2 CMult