Research Article

[Retracted] Secure Two-Party Computation Based on Fast Cut-and-Choose Bilateral Oblivious Transfer

Table 1

Efficiency analysis of each step of our protocol.

StepExponentiationsSymmetric encryptionsGroup elements sentCommunication rounds of / with zero-knowledge proof

12/6
2
3
4
5
6
7
8
Total