Enhanced E-Voting Protocol Based on Public Key Cryptography.
Hani Mahmouad AlMimiSamar A. ShahinMohammad Sh. DaoudMustafa A. Al-FayoumiYazeed GhadiPublished in: ACIT (2019)
Keyphrases
- public key cryptography
- provably secure
- elliptic curve
- public key
- authentication and key agreement
- security model
- security analysis
- authentication protocol
- elliptic curve cryptography
- security services
- session key
- public key infrastructure
- key management
- standard model
- diffie hellman
- digital signature
- security protocols
- key distribution
- signature scheme
- lightweight
- blind signature
- smart card
- secure communication
- cryptographic protocols
- hash functions
- secret key
- private key
- intrusion detection
- access control
- security requirements