Computer and communications security, particularly in the areas of privacy, cryptographic protocols, and fault-tolerant distributed computing. Designing protocols, systems, and services that perform their specified computational or communication functions even if some of the participants or underlying components behave maliciously