Research Article
Outsourced Mutual Private Set Intersection Protocol for Edge-Assisted IoT
Table 1
Difference between the mentioned protocols.
| Type | Reference | Structure | Adversary model | Fairness |
| Public key | [12] | HE | Malicious | Yes | [13] | HE | Malicious | Yes | [16] | FHE + BF | Semihonest | No | [23] | HE + OPE | Malicious | Yes | [24] | HE + OPE + CLS | Malicious | Yes | [25] | HE + PR | Semihonest | Yes | [26] | HE + OPE | Malicious | Yes |
| Garbled circuit | [17] | GC | Semihonest | No | [18] | GC + OPPRF | Semihonest | No |
| Oblivious transfer | [11] | mOPRF + HE | Malicious | Yes | [14] | hash + OPRF | Semihonest | No | [19] | OPRF + garbled BF | Semihonest | No |
| Cloud computing | [20] | HE + OPE | Semihonest | No | [21] | Hash + OPE | Semihonest | No | [22] | Hash + OPE | Semihonest | No |
|
|