Table 4: Comparison of secure subset protocols.

Computation Communication

Kissner’s protocol [17] 3
Protocol 2 3
Protocol 5 3