Please forgive me for asking you another question that you may find very simple (but it is very difficult for me to need your help).
In specific privacy computing tasks, such as 3-party collaborative computing tasks, what algorithms/protocols are used in the execution of tasks, and how are they used?
Take the replicated-ring-party.x execution process as an example, what algorithm/protocol is invoked in what file to accomplish what at each stage
Please forgive me for asking you another question that you may find very simple (but it is very difficult for me to need your help). In specific privacy computing tasks, such as 3-party collaborative computing tasks, what algorithms/protocols are used in the execution of tasks, and how are they used? Take the replicated-ring-party.x execution process as an example, what algorithm/protocol is invoked in what file to accomplish what at each stage