Attacks and Modifications of CJC's E-voting Scheme

In this paper, we point out the security weaknesses of Chen et al.’s e-voting scheme. We give a modification which satisfies the security requirements of a e-voting scheme.