Therefore, focusing on the malicious model, we construct an efficient maliciously two-party secure mixed-protocol framework for data-driven computation tasks.
確定! 回上一頁