Table 5 The degree of privacy protection in different networks.
Simulation data type | FHE | HE | ABE | BTA-AHEA |
|---|---|---|---|---|
1 | No leakage | No leakage | No leakage | No leakage |
2 | There is no leakage, but there is a risk of theft due to Trojan injection | No leakage | No leakage | No leakage |
3 | No leakage | Complete leakage | Varying degrees of information theft | No leakage |
4 | Varying degrees of information theft | There is no leakage, but there is a risk of theft due to Trojan injection | No leakage | There is no leakage, but there is a risk of theft due to Trojan injection |
5 | No leakage | No leakage | No leakage | No leakage |
6 | User data uploaded, displaying unknown program | Varying degrees of information theft | There is no leakage, but there is a risk of theft due to Trojan injection | No leakage |
7 | No leakage | No leakage | No leakage | No leakage |