Research Article
An Improved Coercion-Resistant E-Voting Scheme
Table 2
Comparison of partial security requirement and computation complexity.
| | Performance | [35] | [32] | [33] | Our scheme |
| | Privacy | No | Yes | Yes | Yes | | Coercion resistance | No | No | No | Yes | | Verifiability | Yes | Yes | Yes | Yes | | Computation complexity | | | | |
|
|