Fig. 2From: Secure multiparty computation of a comparison problemExample (\(\lambda <0\))Back to article page