From: Privacy-preserving distributed clustering
Our proposal
Algorithm in[9]
SP
H m
User
Encryption
O( N u R)
O( N g K)
O(1)
O( N u K(R+â„“))
O(K(R+â„“))
Decryption
-
O( N g R)
Multiplication
O(R)
O( N u KR)
O(K(R+ â„“ 2 ))
Exponentiation
O( N u K)
Communication
O( N u (R+K))
O( N g (R+K))