Research Article

Efficient Secure Computation from SM Series Cryptography

Table 1

Symbols used in the OT protocol and the OT extension protocol.

SymbolDescription

, The private key of the users
, The public key of the users
, The hash value of the user’s ID, the system’s parameter, and the user’s public key
The message generation algorithm in the SM2 key agreement protocol
The point generation algorithm in the SM2 key agreement protocol
The key generation algorithm in the SM2 key agreement protocol
The program algorithm in the batch N-POPF
The evaluation algorithm in the batch N-POPF