The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios.
Nicholas Chang-FongAleksander EssexPublished in: ACSAC (2016)
Keyphrases
- end to end
- security analysis
- smart card
- encryption scheme
- security properties
- elliptic curve cryptography
- secret sharing
- security requirements
- public key
- high security
- secret sharing scheme
- digital signature
- authentication protocol
- authentication scheme
- congestion control
- wireless ad hoc networks
- ad hoc networks
- public key cryptography
- multipath
- secret key
- image encryption
- information security
- encryption algorithm
- key management
- computational complexity
- user authentication
- security protocols
- communication networks
- data sharing