“…For instance, there have been many privacy-preserving protocols for basic operations such as less-than/equality check [14,18,20,40,41], division [8,26,39], shuffle [15], and database join [34], just to name a few. Among this line of work, [20,40,41] provided a constant-round less-than protocol over a field and [46] provided a constant-round less-than protocol over a ring. These works have shown that MPC can run at practical speeds since the main overhead of secret-sharing-based MPC arises from the communication delay depending on the number of communication rounds in many cases.…”