Research Article

Low Communication-Cost PSI Protocol for Unbalanced Two-Party Private Sets

Figure 2

PIR from trapdoor hash function.