The document proposes a new secure e-voting protocol based on public-key cryptography. The protocol has three main processes: 1) An access control process for voter identification and authentication; 2) A voting process where voters encrypt their votes using RSA public-key encryption and submit them to a government server; 3) A collecting data process where the server administrator decrypts the encrypted votes using the RSA private key and tabulates the final results. The protocol aims to make e-voting more efficient by allowing voters to cast ballots from their own computers without extra costs or effort. RSA public-key encryption ensures the security of votes transmitted over insecure networks.