Research Article

Efficient Secure Computation from SM Series Cryptography

Figure 16

Two-party Beaver triple generation protocol in the -hybrid model.