Introduction - If you have any usage issues, please Google them yourself
This paper investigates ways to give a method, that is a valid agreement for both parties to use an untrusted third party can be used to build a high-efficiency multi-protocol peer-to-peer security.