P Li, J Lai - Network and System Security: 13th International …, 2019 - Springer
In order to achieve anonymous voting, various cryptographic techniques are usually
leveraged to avoid privacy leakage. However, traditional e-voting systems are excessively …