\subsection{Security considerations}\label{sub:bbs}
-\JFC{To provide a self-contained article without any bias, we shor\-tly
-present the selected encryption process.}
+To provide a self-contained article without any bias, we shor\-tly
+present the selected encryption process.
Among the methods of message encryption/decryption
(see~\cite{DBLP:journals/ejisec/FontaineG07} for a survey)
we implement the asymmetric