Research Article

Efficient Secure Computation from SM Series Cryptography

Figure 14

Malicious setting 1-out-of-2 oblivious transfer extension protocol .