This paper is a second1 step in an ongoing evaluation of the cryptographic protocol.
Category / Keywords: cryptographic protocols / election schemes Date: received 5 Jul 2010, last revised 7 Jul 2010 Contact author: kristian gjosteen at math ntnu no Available formats: PDF | BibTeX Citation Note: Fixed some minor mistakes. Version: 20100707:065231 (All versions of this report) Discussion forum: Show discussion | Start new discussion