Information security — Secure multiparty computation —Part 2: Mechanisms based on secret sharingSécurité de l'in...