Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier.
Liudmila BabenkoIlya PisarevPublished in: CyberC (2018)
Keyphrases
- security analysis
- electronic voting
- blind signature
- public key
- security model
- provably secure
- digital signature
- smart card
- authentication protocol
- mutual authentication
- security properties
- blind signature scheme
- secret sharing
- encryption scheme
- security requirements
- signature scheme
- private key
- secret key
- secret sharing scheme
- cryptographic protocols
- standard model
- security mechanisms
- data storage