A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Security in Connectivity Of connection Establishment
2017
International Journal of Advanced Research in Computer and Information Security
We gift AN economical and provably-secure evokingprotocol, that may be a variant of the JCJ e-voting protocol (Juels et al., 2010). It decreases the whole variety of JCJ's operations from O (n2) to O (n), wherever n is that the variety of votes or voters (whichever is that the maximum). Note that since the operations into consideration are long (e.g., public-key encryption), the advance is sort of substantial. As a rough comparison, contemplate a nationwide election with around 10 million
doi:10.21742/ijacis.2017.1.1.04
fatcat:3v3hzgu2x5gazdtirtjjeykcg4