搜索结果: 1-1 共查到“Vote privacy”相关记录1条 . 查询时间(0.062 秒)
Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker
Provable security Computationally complete symbolic attacke Vote privacy
2018/6/25
We analyze the FOO electronic voting protocol in the provable secu- rity model using the technique of Computationally Complete Symbolic Attacker (CCSA). The protocol uses commitments, blind signatures...