Research Article

Outsourced Mutual Private Set Intersection Protocol for Edge-Assisted IoT

Table 2

Capabilities of the adversary.

TypesDescriptions

C1 can learn the messages transmitted in the communication channel.
C2 can corrupt one of the two participants to obtain its secret data and private key.
C3 can collude with dishonest edge server to obtain the information stored in the server.