Skip to main content

Advertisement

Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Table 1 Summary of the Presented Approaches

From: Efficient private multi-party computations of trust in the presence of curious and malicious users

Protocol Computation Adversarial model Crypto building blocks
AP Average trust Honest but curious Homomorphic (of Paillier)
WAP Weighted average trust Honest but curious Homomorphic (of Paillier)
PKEBP Vector of exact trust; Semi-malicious Any public key encryption
  removal of outliers (restricted)  
CEBP Vector of exact trust; Semi-malicious Commutative (Polhig-Hellman),
  removal outliers (non restricted) ElGamal