Research Article
[Retracted] Secure Two-Party Computation Based on Fast Cut-and-Choose Bilateral Oblivious Transfer
Table 1
Efficiency analysis of each step of our protocol.
| Step | Exponentiations | Symmetric encryptions | Group elements sent | Communication rounds of / with zero-knowledge proof |
| 1 | | | | 2/6 | 2 | | | | 3 | | | | 4 | | | | 5 | | | | 6 | | | | 7 | | | | 8 | | | | Total | | | |
|
|