Table 3 The cost of generating private keys and ciphertext for four algorithms.

From: Privacy protection of communication networks using fully homomorphic encryption based on network slicing and attributes

Network

Reference4

Reference5

Reference6

Reference33

Reference34

This study

Scoring prediction

104.51 × 103 μs

106.87 × 103 μs

183.98 × 103 μs

60.73 × 103 μs

57.89 × 103 μs

55.23 × 103 μs

Loss function

30.75 × 103 μs

32.42 × 103 μs

56.53 × 103 μs

17.12 × 103 μs

15.51 × 103 μs

13.76 × 103 μs

Weight update

11.24 × 103 μs

18.72 × 103 μs

32.26 × 103 μs

10.96 × 103 μs

8.43 × 103 μs

6.11 × 103 μs

Epoch

10.56 × 103 μs

10.70 × 103 μs

20.58 × 103 μs

8.59 × 103 μs

6.84 × 103 μs

5.62 × 103 μs