Keyphrases
- voting protocols
- electronic voting
- key management
- key distribution
- security analysis
- security properties
- secret sharing
- homomorphic encryption
- mutual authentication
- np hard
- wireless sensor networks
- blind signature
- resource constrained
- group communication
- digital signature
- signature scheme
- security issues
- security model
- diffie hellman
- security requirements
- fault tolerant
- image compression