Figure 1From: Efficient private multi-party computations of trust in the presence of curious and malicious users Public Key Encryption Based Protocol PKEBP . Back to article page