Research Article

Privacy Preservation for Friend-Recommendation Applications

Figure 10

The speed of encryption, matching, and decryption.
(a) Computation cost of encryption
(b) Computation cost of matching
(c) Computation cost of decryption