Research Article
Multiparty Threshold Private Set Intersection Protocol with Low Communication Complexity
Table 1
Theoretical communication complexity comparison.
| Protocols | Communication complexity | Security model | Designated party | Party () |
| [28] | | | Semi-honest | [29] | | | Semi-honest | [30] | | | Semi-honest | [30] | | | Malicious | [31] | | | Semi-honest | [31] | | | Augmented-semi-honest | [32] | | | Semi-honest | [32] | | | Augmented-semi-honest | [33] | | | Semi-honest | [34] | | | Semi-honest | [35] | | | Semi-honest | [36] | | | Semi-honest | [38] | | | Semi-honest | [39] | | | Semi-honest () | [39] | | | Semi-honest | [40] | | | Semi-honest | [41] | | | Semi-honest (TAHE-based) | [41] | () | | Semi-honest (TFHE-based) |
|
|