Table 1: Functionality comparison with related works.

Functionality[20][21]Our study

Privacy of datasetOOO
Privacy of input queryOOO
Privacy of kNN resultXOO
Privacy of data access patternXOO
Robustness for collusion attackOXO