N parties were involved in the computation of a function. which did not trust each other. Some of them found a coalition and destroy the security of others through collusion. Based on secure multi-party computation and communica-tions channel. https://www.chiggate.com/jerome-brown-philadelphia-eagles-mitchell-ness-1990-legacy-jersey-discount/