Research Article
An Improved Coercion-Resistant E-Voting Scheme
| Symbol | Significance |
| | The number of voters | | The number of candidates | | i-th voter | | j-th candidate | | Temporary identification of | | Session key of | | The number of session keys negotiated with | | A value can be used to compute masked values | | j-th masked value of the i-th shared polynomial | | A ballot from for | | The shares computed by the i-th shared polynomial | | The credential of | | The sum of shares computed by | | The total number of ballots for |
|
|