Next Article in Journal
PPE-EYE: A Deep Learning Approach to Personal Protective Equipment Compliance Detection
Previous Article in Journal
Joint Inference of Image Enhancement and Object Detection via Cross-Domain Fusion Transformer
Previous Article in Special Issue
pFedKA: Personalized Federated Learning via Knowledge Distillation with Dual Attention Mechanism
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Privacy-Preserving Set Intersection Protocol Based on SM2 Oblivious Transfer

1
School of Computer Science and Technology, Harbin University of Science and Technology, Harbin 150080, China
2
College of Computing and Data Science, Nanyang Technological University, 50 Nanyang Avenue, Singapore 639798, Singapore
*
Author to whom correspondence should be addressed.
Computers 2026, 15(1), 44; https://doi.org/10.3390/computers15010044 (registering DOI)
Submission received: 25 December 2025 / Revised: 5 January 2026 / Accepted: 7 January 2026 / Published: 10 January 2026
(This article belongs to the Special Issue Mobile Fog and Edge Computing)

Abstract

Private Set Intersection (PSI) is a fundamental cryptographic primitive in privacy-preserving computation and has been widely applied in federated learning, secure data sharing, and privacy-aware data analytics. However, most existing PSI protocols rely on RSA or standard elliptic curve cryptography, which limits their applicability in scenarios requiring domestic cryptographic standards and often leads to high computational and communication overhead when processing large-scale datasets. In this paper, we propose a novel PSI protocol based on the Chinese commercial cryptographic standard SM2, referred to as SM2-OT-PSI. The proposed scheme constructs an oblivious transfer-based Oblivious Pseudorandom Function (OPRF) using SM2 public-key cryptography and the SM3 hash function, enabling efficient multi-point OPRF evaluation under the semi-honest adversary model. A formal security analysis demonstrates that the protocol satisfies privacy and correctness guarantees assuming the hardness of the Elliptic Curve Discrete Logarithm Problem. To further improve practical performance, we design a software–hardware co-design architecture that offloads SM2 scalar multiplication and SM3 hashing operations to a domestic reconfigurable cryptographic accelerator (RSP S20G). Experimental results show that, for datasets with up to millions of elements, the presented protocol significantly outperforms several representative PSI schemes in terms of execution time and communication efficiency, especially in medium and high-bandwidth network environments. The proposed SM2-OT-PSI protocol provides a practical and efficient solution for large-scale privacy-preserving set intersection under national cryptographic standards, making it suitable for deployment in real-world secure computing systems.
Keywords: private set intersection; SM2; software-hardware co-design; semi-honest adversary private set intersection; SM2; software-hardware co-design; semi-honest adversary

Share and Cite

MDPI and ACS Style

Guan, Z.; Huang, H.; Yao, H.; Jia, Q.; Cheng, K.; Ge, M.; Yu, B.; Ma, C. Privacy-Preserving Set Intersection Protocol Based on SM2 Oblivious Transfer. Computers 2026, 15, 44. https://doi.org/10.3390/computers15010044

AMA Style

Guan Z, Huang H, Yao H, Jia Q, Cheng K, Ge M, Yu B, Ma C. Privacy-Preserving Set Intersection Protocol Based on SM2 Oblivious Transfer. Computers. 2026; 15(1):44. https://doi.org/10.3390/computers15010044

Chicago/Turabian Style

Guan, Zhibo, Hai Huang, Haibo Yao, Qiong Jia, Kai Cheng, Mengmeng Ge, Bin Yu, and Chao Ma. 2026. "Privacy-Preserving Set Intersection Protocol Based on SM2 Oblivious Transfer" Computers 15, no. 1: 44. https://doi.org/10.3390/computers15010044

APA Style

Guan, Z., Huang, H., Yao, H., Jia, Q., Cheng, K., Ge, M., Yu, B., & Ma, C. (2026). Privacy-Preserving Set Intersection Protocol Based on SM2 Oblivious Transfer. Computers, 15(1), 44. https://doi.org/10.3390/computers15010044

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop