Fig. 2From: Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environmentsPedersen’s VSSBack to article page