TABLE 1

Summary Table of the Information That Can Be Potentially Leaked From User m to Either an Eavesdropping Agent or the n-th User

SchemeEavesdropper privacyn-th user privacyRT
Embedded ImageEmbedded ImageEmbedded ImageEmbedded Image
non-encryption
regular encryption
homomorphic encryption
  • Note: The primary information indicates either the user’s position Embedded Image or the associated position uncertainty Embedded Image. A check denotes that the quantity is kept private, while a cross refers otherwise. The table also shows the real-time (RT) readiness of each approach, given the corresponding complexity.