From: Efficient private multi-party computations of trust in the presence of curious and malicious users
Protocol | Computation | Adversarial model | Crypto building blocks |
---|---|---|---|
AP | Average trust | Honest but curious | Homomorphic (of Paillier) |
WAP | Weighted average trust | Honest but curious | Homomorphic (of Paillier) |
PKEBP | Vector of exact trust; | Semi-malicious | Any public key encryption |
removal of outliers | (restricted) | ||
CEBP | Vector of exact trust; | Semi-malicious | Commutative (Polhig-Hellman), |
removal outliers | (non restricted) | ElGamal |