“…Most of these systems focus primarily on integrity and have not considered long-term privacy as their main concerns. E-voting protocols typically utilize the following cryptographic techniques: mix-net [1,3,14,16,18,19,22,29,41,45,56,57,63,66], homomorphic encryption [2,4,25,27,28,40,43,47], blind signature [12,17,44,51,54] and secret sharing based on polynomials [6,7,27,59] or simple (n, n) secret sharing [68]. Despite numerous previous work on everlasting voting privacy [10,11,27,32,33,[46][47][48][49][50]64], we note that the adversary models under which these schemes can achieve privacy could be different.…”