Login / Signup

An experiment on the security of the Norwegian electronic voting protocol.

Kristian GjøsteenAnders Smedstuen Lund
Published in: Ann. des Télécommunications (2016)
Keyphrases
  • electronic voting
  • blind signature
  • voting protocols
  • blind signature scheme
  • secret sharing
  • provably secure
  • signature scheme
  • public key
  • frequency domain
  • security policies
  • security analysis