... B1=(ˆX1)TˆX2and A2+ B2= (ˆX2)TˆX1. Therefore, Alice and Bob can obtainC(1)and C(2), respectively, where C(1)+ C(2)=ˆXTˆX, and C(1)and C(2)can be presented as ... (ˆX2)TˆX2and (ˆX1)TˆX1can be locally computed without dis-closing raw data. In addition, using private matrix sharing protocol, Alicecan obtains A1and A2, Bob can obtains B1and B2, ... be risk ones and may be frauds. Gathering all kinds offinancial data about their customers and their transactions can help themin the above predictions, thus they prevent huge financial losses....