Research Article

High Efficiency Secure Channels for a Secure Multiparty Computation Protocol Based on Signal

Figure 2

Elapsed time of key generation, including “t = 2, n = 3,” “t = 3, n = 4,” and “t = 4, n = 5.”