Skip to main content

Table 1 Summary of the Presented Approaches

From: Efficient private multi-party computations of trust in the presence of curious and malicious users

Protocol

Computation

Adversarial model

Crypto building blocks

AP

Average trust

Honest but curious

Homomorphic (of Paillier)

WAP

Weighted average trust

Honest but curious

Homomorphic (of Paillier)

PKEBP

Vector of exact trust;

Semi-malicious

Any public key encryption

 

removal of outliers

(restricted)

 

CEBP

Vector of exact trust;

Semi-malicious

Commutative (Polhig-Hellman),

 

removal outliers

(non restricted)

ElGamal