Mobile Information Systems / 2015 / Article / Figbox 2

Research Article

Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks

Box 2

The description of protocol II in the fail-stop setting.
Protocol II
(1) Step one: Both parties run functionality ShareGen to receive and ,
 where .
(2) Step two: For to , each party decides whether to exchange his shares with the other party
 using the TFT strategy. We highlight two premises.
(a) Each party satisfies assumptions (a)–(c).
(b) Meanwhile, parties do not know exactly whether his opponent is a TFTer party.
Note: The utility assumptions and the incomplete information compel cooperation before round .
(3) Outputs: Parties decide the outputs according to messages they have received.

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.