Table 1 Performance comparison.

From: Secure computation protocol of Chebyshev distance under the malicious model

Protocol

Computation complexity

Communication rounds

Security model

Cryptosystem

Anti quantum

attack

Protocol 1

\(12nM_{P}\)

2

Semi-honest

NTRU

Protocol 2

\((8n + 8)M_{P}\)

5

Malicious

NTRU

26-Protocol 1

\((10n + 2n\lg p)M_{P}\)

2

Semi-honest

Goldwasser-Micali

 × 

26-Protocol 2

\((2(6n + 1))M_{P}\)

2

Enhanced semi-honest

Paillier

 × 

27-Protocol 3

\((2n + 3)M_{e}\)

3

Semi-honest

Paillier

 × 

27-Protocol 4

\((4n + 3)M_{e}\)

3

Semi-honest

Paillier

 × 

28 -Protocol 4

\((2n + 3)M_{e}\)

2

Semi-honest

Paillier

 × 

29-Protocol 5

\(14M_{e}\)

6

Semi-honest

Paillier

 × 

29-MD

\(18M_{e}\)

6

Semi-honest

Paillier

 ×