“…For example, the solutions from [2, 8, 9, 12-15, 20, 24, 25, 28, 32, 36] fall into this category. More specifically, the solutions from [2,8,9,12,15,20,32] focus on distributed setting where every individual user is expected to participate in the recommendation computation, while those from [13,14,24,25,28,36] focus on partitioned dataset, where several organizations wish to compute recommendations for their own users by joining their private dataset. These solutions typically assume semi-honest attackers and apply existing cryptographic primitives to secure the procedures in standard recommender protocols.…”