1. The document describes the Oblivious Bloom Intersection protocol for privately comparing sets between a client and server.
2. The client builds a Bloom filter from its set and the server builds garbled Bloom filters (GBFs) from its set using cryptographic techniques.
3. Oblivious transfer is used to retrieve bits from the GBFs to reconstruct the client's Bloom filter, revealing any intersecting elements without revealing non-intersecting elements.
2. Step 1 : Form Bloom Filter from data at Client
and Garbled Bloom filter from data at Server
Input at Client , set C = 5,7
Input at Server , set S = 3,5,7,18,98,67
Assume that the sequence of hash algorithms are exchanged between the two
parties, H = {MD5,MD4,MD2,SHA1}