Research Article
Outsourced Mutual Private Set Intersection Protocol for Edge-Assisted IoT
Table 2
Capabilities of the adversary.
| Types | Descriptions |
| C1 | can learn the messages transmitted in the communication channel. | C2 | can corrupt one of the two participants to obtain its secret data and private key. | C3 | can collude with dishonest edge server to obtain the information stored in the server. |
|
|