Research Article

Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification

Figure 2

(a) Computational costs of system initialization. (b) Computational costs of KeyGen algorithm.
(a)
(b)