Research Article
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing
Table 1
Comparison of protocols in applicability.
| Comparison of algorithms | Number of participants | System model | Online necessary or not |
| Dong et al. [13] | 2 | Traditional Secure Multiparty Computation model | Yes | Huang et al. [19] | 2 | Traditional Secure Multiparty Computation model | Yes | Kerschbaum [15] | 2 | Traditional Secure Multiparty Computation model | Yes | The proposed algorithm | ≥2 | Outsourcing computation model | No |
|
|