Research Article
An Improved Coercion-Resistant E-Voting Scheme
Table 2
Comparison of partial security requirement and computation complexity.
| Performance | [35] | [32] | [33] | Our scheme |
| Privacy | No | Yes | Yes | Yes | Coercion resistance | No | No | No | Yes | Verifiability | Yes | Yes | Yes | Yes | Computation complexity | | | | |
|
|