Verifiable Democracy a Protocol to Secure an Electronic Legislature.
Yvo DesmedtBrian KingPublished in: EGOV (2002)
Keyphrases
- cryptographic protocols
- covert channel
- authentication protocol
- security protocols
- electronic transactions
- secret sharing
- scalar product
- key distribution
- lightweight
- multi party
- group communication
- secure routing
- key exchange protocol
- key agreement protocol
- security analysis
- privacy preserving
- secure multiparty computation
- security requirements
- homomorphic encryption
- vertically partitioned data
- payment systems
- mutual authentication
- provably secure
- secure electronic
- secure multi party
- password authentication
- security properties
- electronic commerce
- key management
- diffie hellman
- electronic voting
- cryptographic algorithms
- security mechanisms
- trusted third party
- rfid systems
- e government
- security model
- smart card
- security services
- key establishment
- mobile payment
- key exchange
- secure communication
- sufficient conditions
- key agreement
- standard model
- security issues
- signature scheme
- sensor networks
- access control
- encryption scheme
- elliptic curve
- secret sharing scheme
- user authentication
- wireless sensor networks
- dot product