Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker.
Gergei BanaRohit ChadhaAjay Kumar EerallaPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- formal analysis
- formal methods
- personal information
- ban logic
- privacy preserving
- artificial intelligence
- differential privacy
- low cost
- private information
- agent model
- privacy protection
- database systems
- databases
- sensitive information
- symbolic representation
- security issues
- privacy concerns
- software engineering
- case study