Table 1 Compatibility of related schemes from the literature with the proposed model requirements.

From: Oblivious network intrusion detection systems

Algorithm

Yao’s GC10

GMW 18

BGW20

GESS22

PSI24

Niksefat31

GGHLM34

Ours [this paper]

Approach

Logic functions

Logic functions

Arithmetic functions

Logic functions

Custom protocol

ODFA

NFA

Logic functions

MR1 data access

âś“

âś“

âś“

âś“

âś•

âś•

âś“

âś“

MR2 No Int. Comm.

âś“

âś•

âś“

âś“

âś“

âś“

âś“

âś“

MR3 small result

âś“

âś“

âś“

âś“

âś•

âś“

âś“

âś“

MR4 reusability

âś•

âś•

âś•

âś•

âś“

âś“

âś“

âś“

MR5 modularity

âś•

âś“

âś•

âś•

âś•

âś“

âś•

âś“