From: Privacy-preserving combinatorial auction without an auctioneer
Phases
The proposed scheme
Add and multiple protocol in [17]
Scheme in [16]
Initialization phase
0
3q×l
q×l
Construction phase
Recovery and verification (recovery)
d×l×logl
Tracing to the optimal path
d×l×(q+logl)
d×l×(q+logl)+1