A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability.
Kristian GjøsteenMartin StrandPublished in: Financial Cryptography Workshops (2017)
Keyphrases
- security properties
- encryption scheme
- cryptographic protocols
- privacy preserving
- access control
- information security
- statistical databases
- security requirements
- intrusion detection
- security policies
- security issues
- security level
- computer security
- security protocols
- network security
- security vulnerabilities
- high security
- security management
- security problems
- database
- security analysis
- key management
- data exchange
- functional requirements
- public key
- information assurance