Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols.
Yvo DesmedtStelios ErotokritouPublished in: CoRR (2015)
Keyphrases
- security services
- cryptographic protocols
- security issues
- electronic voting
- sensitive data
- security protocols
- authentication protocol
- key distribution
- key exchange
- security mechanisms
- security properties
- public key encryption
- voting protocols
- application level
- security requirements
- key agreement protocol
- key management scheme
- security analysis
- key establishment
- key management
- security management
- provably secure
- scalar product