Research Article

Efficient Secure Multiparty Subset Computation

Table 4

Comparison of secure subset protocols.

Computation Communication

Kissner’s protocol [17] 3
Protocol 2 3
Protocol 5 3