101809.fig.008
Figure 8: Performance comparison of honest, dishonest, and malicious users in scheme III.