Table 5 The degree of privacy protection in different networks.

From: Privacy protection of communication networks using fully homomorphic encryption based on network slicing and attributes

Simulation data type

FHE

HE

ABE

BTA-AHEA

1

No leakage

No leakage

No leakage

No leakage

2

There is no leakage, but there is a risk of theft due to Trojan injection

No leakage

No leakage

No leakage

3

No leakage

Complete leakage

Varying degrees of information theft

No leakage

4

Varying degrees of information theft

There is no leakage, but there is a risk of theft due to Trojan injection

No leakage

There is no leakage, but there is a risk of theft due to Trojan injection

5

No leakage

No leakage

No leakage

No leakage

6

User data uploaded, displaying unknown program

Varying degrees of information theft

There is no leakage, but there is a risk of theft due to Trojan injection

No leakage

7

No leakage

No leakage

No leakage

No leakage