Login / Signup

Cryptographic protocols implementation security verification of the electronic voting system based on blind intermediaries.

Liudmila BabenkoIlya PisarevElena Popova
Published in: SIN (2019)
Keyphrases
  • cryptographic protocols
  • electronic voting
  • security properties
  • security protocols
  • standard model
  • blind signature
  • authentication protocol
  • encryption decryption
  • lightweight
  • blind signature scheme