Research Article
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification
Figure 3
(a) The impact of the size of attributes on runtime in the Blind algorithm. (b) The impact of the cardinality of datasets on runtime in the Blind algorithm.
(a) |
(b) |