Research Article

Efficient Private Set Intersection Using Point-Value Polynomial Representation

Table 2

Comparison with related PSI protocols.

TypeProtocolProperty
Needing cryptosystemSimulated-based SecurityComputation ComplexityCommunication Complexity

Public-keyCristofaro2010 [18]asymYes
CircuitHuang2012 [26]symNo
OTDong2013 [32]symYes
Pinkas2014 [34]symNo
Pinkas2018 [3]symNo
NovelOurNoYes

asym: public-key cryptography. sym: symmetric cryptography. : set cardinality.