“…In practical applications, specific schemes are more widely used [ 11 ]. Secret sharing [ 12 ], garbled circuit [ 13 , 14 ], oblivious transfer [ 15 ], commitment schemes [ 16 ] and homomorphic encryption [ 17 ] are the key pieces of technology to realize SMPC, and SMPC is of great significance in the study of secret sharing schemes and privacy protection, where it is widely used in correlation analysis, data security queries, trusted data exchanges, etc. [ 18 , 19 , 20 , 21 , 22 ].…”