Research Article
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification
| | Input: | | | Output: the intersection of dataset and dataset | | (1) | if, then | | (2) | printf (“the returned dataset is not intact”); | | (3) | exit (0); | | (4) | end | | (5) | Compute ; | | (6) | Set ; | | (7) | fordo | | (8) | fordo | | (9) | Compute ; | | (10) | if, then | | (11) | printf (“,” yj); | | (12) | else | | (13) | j++; | | (14) | end | | (15) | end | | (16) | i++; | | (17) | end |
|