Fig. 4From: Secure multiparty computation of a comparison problemSelecting \(P_0'\) Back to article page