Research Article

Efficient Secure Multiparty Subset Computation

Figure 1

Comparison of the implementation of subset protocols.