<s>
In	O
cryptography	O
,	O
the	O
anonymous	B-Protocol
veto	I-Protocol
network	I-Protocol
(	O
or	O
AV-net	B-Protocol
)	O
is	O
a	O
multi-party	O
secure	O
computation	O
protocol	O
to	O
compute	O
the	O
boolean-OR	O
function	O
.	O
</s>
<s>
A	O
related	O
protocol	O
that	O
securely	O
computes	O
a	O
boolean-count	O
function	O
is	O
open	B-Protocol
vote	I-Protocol
network	I-Protocol
(	O
or	O
OV-net	B-Protocol
)	O
.	O
</s>
<s>
For	O
example	O
,	O
a	O
Schnorr	B-Algorithm
group	I-Algorithm
can	O
be	O
used	O
.	O
</s>
<s>
Round	O
1	O
:	O
each	O
participant	O
selects	O
a	O
random	O
value	O
and	O
publishes	O
the	O
ephemeral	O
public	O
key	O
together	O
with	O
a	O
zero-knowledge	B-Protocol
proof	I-Protocol
for	O
the	O
proof	O
of	O
the	O
exponent	O
.	O
</s>
<s>
Round	O
2	O
:	O
each	O
participant	O
publishes	O
and	O
a	O
zero-knowledge	B-Protocol
proof	I-Protocol
for	O
the	O
proof	O
of	O
the	O
exponent	O
.	O
</s>
