Research Article

Efficient Secure Computation from SM Series Cryptography

Figure 12

Semihonest setting 1-out-of-2 oblivious transfer extension protocol .