Review Article

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Figure 4

For two parties (Alice and Bob) to initiate GMW computation, they must first split their inputs into shares and each sends one of their shares to the other party. Alice gets all shares; Bob gets all shares.