Fig. 3From: Secure multiparty computation of a comparison problemSelecting \(P_1', P_2'\) Back to article page