Fig. 1From: Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environmentsA typical IS model in UCEBack to article page