Making Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols.
Yvo DesmedtStelios ErotokritouPublished in: VoteID (2015)
Keyphrases
- security issues
- cryptographic protocols
- security services
- sensitive data
- security protocols
- key agreement protocol
- key distribution
- security measures
- key exchange
- security properties
- authentication protocol
- public key encryption
- electronic voting
- key management
- security requirements
- key management scheme
- standard model
- key agreement
- security mechanisms
- security threats
- security management
- group communication
- multi party
- data storage
- unauthorized access
- security analysis
- information security
- application level
- scalar product
- privacy preserving