Research Article

Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification

Figure 4

(a) The impact of the size of data user’s attributes on runtime in the TokenGen1 algorithm. (b) The impact of the size of data user’s attributes on runtime in the TokenGen2 algorithm.
(a)
(b)