Scheme | Eavesdropper privacy | n-th user privacy | RT | ||
---|---|---|---|---|---|
non-encryption | ✔ | ✘ | ✔ | ✘ | ✔ |
regular encryption | ✔ | ✔ | ✔ | ✘ | ✔ |
homomorphic encryption | ✔ | ✔ | ✔ | ✔ | ✘ |
Note: The primary information indicates either the user’s position or the associated position uncertainty . A check denotes that the quantity is kept private, while a cross refers otherwise. The table also shows the real-time (RT) readiness of each approach, given the corresponding complexity.