Research Article

Efficient Secure Computation from SM Series Cryptography

Algorithm 1

1. Set ;
2. For :
ā€ƒ(a) Compute ;
ā€ƒ(b) Set ;
3. If , set as the top bits of ; otherwise, set ;
4. Set ;
5. Output .