Skip to main content
. 2022 Sep 9;11(18):2785. doi: 10.3390/foods11182785
Algorithm A2 Secure Multiparty Computing Contract-B
   1: if Data usage request received
Query the number of members the secret has z
For (i = 0, i < =z, i++)
         { i = 0;
          Send(request)R0->Pz;
           i++;
           }//Send request messages to each data owner node
           Return “Sending successfully”
Else “Sending failure”
   2: if Receive (Sig (Request) Rz) //Feedback from Data Owners
If Sig (Request) Rz = z
Return “Allow requests”
Else “Request failed”
Else “No feedback”