Research Article
Efficient Secure Computation from SM Series Cryptography
Table 1
Symbols used in the OT protocol and the OT extension protocol.
| Symbol | Description |
| , | The private key of the users | , | The public key of the users | , | The hash value of the user’s ID, the system’s parameter, and the user’s public key | | The message generation algorithm in the SM2 key agreement protocol | | The point generation algorithm in the SM2 key agreement protocol | | The key generation algorithm in the SM2 key agreement protocol | | The program algorithm in the batch N-POPF | | The evaluation algorithm in the batch N-POPF |
|
|