Research Article

An Improved Coercion-Resistant E-Voting Scheme

Table 1

List of notations.

SymbolSignificance

The number of voters
The number of candidates
i-th voter
j-th candidate
Temporary identification of
Session key of
The number of session keys negotiated with
A value can be used to compute masked values
j-th masked value of the i-th shared polynomial
A ballot from for
The shares computed by the i-th shared polynomial
The credential of
The sum of shares computed by
The total number of ballots for