\subsection{Security considerations}\label{sub:bbs}
+\JFC{To provide a self-contained article without any bias, we shortly
+pressent the retained encryption process.}
Among the methods of message encryption/decryption
(see~\cite{DBLP:journals/ejisec/FontaineG07} for a survey)
we implement the asymmetric