Skip to main content

Table 3 Communication complexity

From: Privacy-preserving combinatorial auction without an auctioneer

Phases

The proposed scheme

Add and multiple protocol in [17]

Scheme in [16]

Initialization phase

0

3q×l

q×l

Construction phase

0

q×l

0

Recovery and verification (recovery)

0

d×l×logl

d×l×logl

Tracing to the optimal path

d×l×(q+logl)

d×l×(q+logl)+1

d×l×(q+logl)