Table 1 Performance comparison.
From: Secure computation protocol of Chebyshev distance under the malicious model
Protocol | Computation complexity | Communication rounds | Security model | Cryptosystem | Anti quantum attack |
|---|---|---|---|---|---|
Protocol 1 | \(12nM_{P}\) | 2 | Semi-honest | NTRU | √ |
Protocol 2 | \((8n + 8)M_{P}\) | 5 | Malicious | NTRU | √ |
26-Protocol 1 | \((10n + 2n\lg p)M_{P}\) | 2 | Semi-honest | Goldwasser-Micali | × |
26-Protocol 2 | \((2(6n + 1))M_{P}\) | 2 | Enhanced semi-honest | Paillier | × |
27-Protocol 3 | \((2n + 3)M_{e}\) | 3 | Semi-honest | Paillier | × |
27-Protocol 4 | \((4n + 3)M_{e}\) | 3 | Semi-honest | Paillier | × |
28 -Protocol 4 | \((2n + 3)M_{e}\) | 2 | Semi-honest | Paillier | × |
29-Protocol 5 | \(14M_{e}\) | 6 | Semi-honest | Paillier | × |
29-MD | \(18M_{e}\) | 6 | Semi-honest | Paillier | × |