Research Article
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification
Figure 4
(a) The impact of the size of data user’s attributes on runtime in the TokenGen1 algorithm. (b) The impact of the size of data user’s attributes on runtime in the TokenGen2 algorithm.
(a) |
(b) |