Research Article
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification
| Input: | | Output: the intersection of dataset and dataset | (1) | if, then | (2) | printf (“the returned dataset is not intact”); | (3) | exit (0); | (4) | end | (5) | Compute ; | (6) | Set ; | (7) | fordo | (8) | fordo | (9) | Compute ; | (10) | if, then | (11) | printf (“,” yj); | (12) | else | (13) | j++; | (14) | end | (15) | end | (16) | i++; | (17) | end |
|