Research Article
Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks
Box 2
The description of protocol II in the fail-stop setting.
| Protocol II | | (1) Step one: Both parties run functionality ShareGen to receive and , | | where . | | (2) Step two: For to , each party decides whether to exchange his shares with the other party | | using the TFT strategy. We highlight two premises. | | (a) Each party satisfies assumptions (a)–(c). | | (b) Meanwhile, parties do not know exactly whether his opponent is a TFTer party. | | Note: The utility assumptions and the incomplete information compel cooperation before round . | | (3) Outputs: Parties decide the outputs according to messages they have received. |
|