“…We identify five categories of PETs: (a) input randomization ( §6.1), (b) differential privacy-based solutions ( §6.2), (c) cryptographic approaches ( §6.3), (d) hardware-based solutions ( §6.4), and (e) hybrid solutions that combine the above ( §6.5). [41,55,56,76,96,160] FD (2 parties) [111,121,181] FD (2 parties) [80] Leader [32,37,153,166,186] Leader [72,104,156,187] Leader [190] Sequential [110,162] Aggregator [52,117,119,152,154,172] Aggregator…”