Research Article
Electronic Voting Protocol Using Identity-Based Cryptography
Table 1
Proposed protocol does not need any component of a PKI.
| Protocol | PKI Component 1 | PKI Component 2 | Privacy and robustness based on |
| Cramer et al. [1] | 0 | 0 | DHP |
Mu et al. [2] | | 0 | DHP | Ohkubo et al. [3] | | 0 | DHP | Baudron et al. [4] | | 0 | RC |
Gallegos-García et al. [5] | 0 | 1 | CBDHP | Proposed protocol | 0 | 0 | CBDHP |
|
|