I. Introduction
The private set intersection (PSI) protocol [1] enables two or more parties to privately compute the intersection of their private sets and does not disclose any information to any participating party other than the elements in the intersection. This protocol has been extensively applied in the real world. For example, in a business-to-consumer (B2C) environment, it is used to check and warn weak password accounts of Google's browser Chrome [2]. In the consumer-to-consumer (C2C) environment, it has been proposed to prevent cheating in online games [3]. In response to the recent epidemic of COVID-19, a scheme based on the PSI protocol for contact tracing has been proposed [4]. In addition, the PSI protocol is also widely used in privacy access scenarios such as mobile applications [5], [6].