“…However, the drawback of Elmehdwi et al's algorithm is excessively high computational cost because SBD, SMIN, and SMIN n protocols use an encrypted binary array as input value. For example, when we perform the SMIN protocol between E(8) and E (7), clouds transform an encrypted decimal value into an encrypted binary array: E(8) (10) = {E(1), E(0), E(0), E(0)} (2) , E(7) (10) = {E(0), E(1), E(1), E(1)} (2) . After that, clouds perform the SMIN protocol between E(8) (10) = {E(1), E(0), E(0), E(0)} (2) and E(7) (10) = {E(0), E(1), E(1), E(1)} (2) .…”