Problem 3 :

Additional information

  • The encryption of identifiers should look like conventional block cipher encryption: without large precomputed secret tables, with the ability to quickly change the key K.
  • The shuffling of ballots is performed by election authorities, not by voters.
alt: Open file