https://store-images.s-microsoft.com/image/apps.12823.a69ea3d7-18f2-4e8c-9b48-d973b571017b.8f21d6a7-a942-4eed-99c7-30c4bcdbaa00.b68c5230-524f-4be3-b741-19b9582452a2

Optable

bCloud LLC

(1 ratings)

Optable

bCloud LLC

(1 ratings)

Version 1.4.0 + Free with Support on Ubuntu 24.04

Optable Match is an open-source Go library and reference implementation for performing secure multi-party computation protocols such as Private Set Intersection (PSI). It allows organizations to compare encrypted datasets and discover common identifiers without exposing sensitive data. The project provides sender and receiver example applications to demonstrate real-world usage of these cryptographic protocols.

Features of Optable Match:

  • Implements secure private set intersection (PSI) using advanced cryptography.
  • Includes sender and receiver demo applications for hands-on testing.
  • Processes large sets of identifiers efficiently with built-in performance optimizations.
  • Protects sensitive data during computation—no raw identifiers are leaked.
  • Open-source, actively maintained, and designed for integration into real-world data collaboration workflows.

To check that Optable Match is working correctly on your environment, follow these steps:

$ cd /opt/match-1.4.0/examples

# Step 1: Create receiver IDs
$ echo -e "67890\nabcdef\nxyz123" > receiver-ids.txt

# Step 2: Start the receiver (keep it running)
$ go run receiver/main.go

# Step 3: In another terminal, create sender IDs
$ echo -e "12345\n67890\nabcdef" > sender-ids.txt

# Step 4: Run the sender
$ go run sender/main.go

# Step 5: Check the results of the match
$ cat common-ids.txt
67890
abcdef

This confirms that Optable Match is installed correctly and the PSI protocol works, with the common identifiers written to common-ids.txt.

Disclaimer: Optable Match is released under the Apache 2.0 License and maintained by the Optable community. Users are responsible for ensuring secure integration into their own applications. The maintainers do not assume liability for data usage or outcomes. Always consult the official documentation and security guidelines before production deployment.