Research Article
Electronic Voting Protocol Using Identity-Based Cryptography
Table 2
Cryptographic operations developed in the proposed protocol.
| Op. | Ohkubo et al. [3] | Cramer et al. [1] | Baudron et al. [4] | Mu et al. [2] | Gallegos-GarcĂa et al. [5] | Proposed protocol |
| + | 3 | 1 | | 1 | 0 | | | | | | 6 | 0 | | | 13 | | | 11 | 0 | 0 | | 2 | 3 | | 1 | 1 | 1 | | NA | NA | NA | NA | 0 | 0 | | NA | NA | NA | NA | | | Hash | 5 | NA | NA | NA | | | | 0 | 0 | 0 | 0 | | |
|
|