Proceedings of the 2010 ACM Symposium on Applied Computing 2010
DOI: 10.1145/1774088.1774401
|View full text |Cite
|
Sign up to set email alerts
|

Computing multi-party trust privately

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…We first describe the MPWP protocol [17], and then we explain modifications made to construct P-MPWP a lighter version of MPWP.…”
Section: From Mpwp To P-mpwpmentioning
confidence: 99%
See 3 more Smart Citations
“…We first describe the MPWP protocol [17], and then we explain modifications made to construct P-MPWP a lighter version of MPWP.…”
Section: From Mpwp To P-mpwpmentioning
confidence: 99%
“…The MPWP protocol [17] is used to securely compute private trust values in an additive reputation system between n players. Each player P i (excepted P 1 , assumed to be the master player) has a private entry v i , and P 1 private entries are weights u i associated to others players.…”
Section: Mpwp Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…How to maintain trust, privacy, and evaluation without a trusted authority becomes an important issue. In 2010, Dolev et al showed how multi-users trust each other without the help of trusted authority [1]. Their scheme also significantly reduced the number of message exchanges, and therefore, it is more suitable for real environments.…”
Section: Introductionmentioning
confidence: 99%