In Figure 1 of the paper, step 1 has each node encrypt its proposed value, while step 3 decrypts. Would would go wrong if, instead, the protocol did away with encryption and ran ACS directly on each individual node's proposed value? Why?
Answers need only be a few sentences.
Turn in your answer on paper at the start of class. Be sure both your SUNet ID and your name are on the paper.
SCPD students may submit via SCPD before the start of class.