Authentication with weaker trust assumptions for voting systems

Elizabeth A. Quaglia, Ben Smyth. Authentication with weaker trust assumptions for voting systems. IACR Cryptology ePrint Archive, 2018:222, 2018. [doi]

Abstract

Abstract is missing.