Skip to main content

Table 2 Communication and computational complexity for SP, H m and user i for one iteration of the algorithm

From: Privacy-preserving distributed clustering

 

Our proposal

Algorithm in[9]

 

SP

H m

User

SP

User

Encryption

O( N u R)

O( N g K)

O(1)

O( N u K(R+â„“))

O(K(R+â„“))

Decryption

-

O( N g R)

-

O( N u K(R+â„“))

-

Multiplication

O( N u R)

-

O(R)

O( N u KR)

O(K(R+ â„“ 2 ))

Exponentiation

O( N u K)

-

O(R)

-

O(K(R+ â„“ 2 ))

Communication

O( N u (R+K))

O( N g (R+K))

O(R)

O( N u K(R+â„“))

O(K(R+â„“))

  1. In terms of Paillier encryptions. SP, service provider, H m , helper user.