A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext.
Bo MengPublished in: J. Networks (2009)
Keyphrases
- authentication protocol
- security analysis
- secret key
- ciphertext
- mutual authentication
- cryptographic protocols
- public key
- smart card
- encryption scheme
- authentication scheme
- user authentication
- key distribution
- security protocols
- ban logic
- stream cipher
- security properties
- lightweight
- rfid systems
- session key
- key exchange
- encryption algorithm
- key management
- security requirements
- rfid tags
- secure communication
- password authentication
- image encryption
- private key
- hash functions
- trusted third party
- internet voting
- diffie hellman
- encryption algorithms
- end to end
- operating system