“…In this algorithm, homomorphism encryption, digital envelope and difference comparison method was used to protect the data privacy. In Part 1, the computational overhead mainly includes: O (1) for key generation [14], O (1) for encryption process, O (1) for generate t random numbers, O ( nlog(n) ) for the sorting of n numbers [15], O (n) for communication complexity, so the complexity of the whole is O ( nlog(n) ) + O (n). In Part 2, the communication complexity is O (t), computational complexity, including: O (1) for generating random numbers, O (n) for calculation process; the overall complexity is O (t) + O (n).…”