An efficient and provably-secure coercion-resistant e-voting protocol.
Alireza Toroghi HaghighatMohammad Sadeq DoustiRasool JaliliPublished in: PST (2013)
Keyphrases
- provably secure
- blind signature
- electronic voting
- standard model
- security model
- key management
- public key
- blind signature scheme
- hash functions
- signature scheme
- public key cryptography
- bilinear pairings
- diffie hellman
- threshold signature scheme
- secret sharing scheme
- encryption scheme
- resource constrained
- cost effective
- lightweight
- access control
- wireless sensor networks