Table 4 Comparison points between the two studies.

From: Privacy-preserving communication in smart city transportation using elliptic curve cryptography

Comparison Points

This study

Assumed study

Application–based Comparison

Computational overhead

Does ECC or Differential Privacy have lower computational overhead, especially for large datasets?

√

X

Management of privacy Budgets

Which method requires more complex management of privacy budgets?

X

√

Scalability

Is ECC or Differential Privacy more scalable to large systems without significant performance degradation?

√

X

Data utility

Which method preserves data utility without modifying the original data?

√

X

Privacy guarantees

Does ECC or Differential Privacy provide quantifiable privacy guarantees?

X

√

Ease of implementation

Is ECC or Differential Privacy easier to implement, especially for individuals without specialized expertise?

√

X

Theoretical Comparison

Cryptographic security

Is ECC or Differential Privacy more effective in providing cryptographic security?

√

X

Data integrity

Which method ensures better data integrity during transmission and storage?

√

X

Fine-grained control

Does ECC or Differential Privacy offer finer control over data access through encryption?

√

X

Data accuracy

Which method preserves data accuracy without altering the original data?

√

X

Trust requirements of key generation

Does ECC or Differential Privacy require a trusted setup once keys are generated?

X

√

Adversarial robustness

Which method is more robust against adversaries?

√

X

Regulatory compliance

Which method is often recognized and compliant with regulatory standards for data protection?

√

X

Resilience to attacks

Which approach demonstrates greater resilience to attacks on the encryption mechanism?

√

X

Resource efficiency

Considering resource efficiency, which method typically performs more efficiently in terms of processing and transmission?

√

X

Total scores

80%

20%

Accumulative difference

20%

80%