Fig. 3From: Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environmentsProposed RSSBack to article page