AAAM Kamal, K Iwamura - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Typically, when secrecy multiplication is performed in multiparty computation using Shamir's
(k, n) threshold secret sharing scheme, the result is a polynomial with degree of 2k-2 instead …