Skip to main content

Advances, Systems and Applications

Table 2 Protocol comparison

From: A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique

Protocol

Computational complexity

Communication complexity

De Cristofaro and Tsudik [12]

2(NX+NY)pk2

(NX+NY)\(\rho\)+NX\(\nu\)

Pinkas et al. [21]

\(3\in {NY + (k + s)NXsym}\)1

512\(\in\)NY + (k + s)NX\(\nu\)

Dong et al. [23]

3.6m3\(\kappa sym\)

\(1:44m\kappa (\kappa +\lambda )\)

Ciampi and Orlandi [22]

m(4\(\sigma\) log m+3\(\sigma\))sym

m(2\(\sigma \kappa +m\kappa\))

Ours

2(NX+NY)pk+2.5m \(\kappa\) sym

NY\(\rho\)+NX\(\nu\)

  1. 1k,s: The parameters used in the hash function.
  2. 2\(\kappa\): The security parameters.
  3. 3m: max(NX;NY)