Research Article

Research on the Millionaires’ Problem under the Malicious Model Based on the Elliptic Curve Cryptography

Table 1

The 0-1 encoding. Data comparison results of Alice and Bob.

Alice’s dataNew set for encodingBob’s dataCalculate Comparison results

52
5
7