Research Article

Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification

Algorithm 1

PSI computation.
Input:
Output: the intersection of dataset and dataset
(1)if, then
(2) printf (“the returned dataset is not intact”);
(3) exit (0);
(4)end
(5)Compute ;
(6)Set ;
(7)fordo
(8)fordo
(9)  Compute ;
(10)  if, then
(11)   printf (“,yj);
(12)  else
(13)   j++;
(14)  end
(15)end
(16)i++;
(17)end