Incentive-driven attacker for corrupting two-party protocols