Skip to main content

Table 3 Communication complexity

From: Privacy-preserving combinatorial auction without an auctioneer

Phases The proposed scheme Add and multiple protocol in [17] Scheme in [16]
Initialization phase 0 3q×l q×l
Construction phase 0 q×l 0
Recovery and verification (recovery) 0 d×l×logl d×l×logl
Tracing to the optimal path d×l×(q+logl) d×l×(q+logl)+1 d×l×(q+logl)