Receipt-Free Multi-Authority Voting with (2,2) Secret Sharing Based Authentication

Abstract

Election and voting are the important activities in the democratic countries. The traditional voting system becomes inconvenient for the people who cannot visit the polling booth for the vote casting. To overcome the drawback of traditional voting system web based voting systems are introduced. Security is an important issue in the web based voting system. The proposed system provides secured authentication through the visual secret sharing scheme

Authors and Affiliations

Ms. Ashwini Walake

Keywords

Related Articles

Network Security and Cryptography

Network Security & Cryptography is a complicated and Historically only tackled by Well-trained and experienced experts. However as more and more people become “wired”, an increasing number of people need to understand th...

Design and Implementation of a Modular Multilevel Inverter with FACTS Capability for Wind and PV systems

In this paper, a new three-phase inverter with flexible AC transmission system (FACTS) capability is presented. The proposed inverter is placed between the PV cell and the grid, same as a regular inverter, and is able to...

Effect of Fuel Injection Pressures on Performance Characteristics and Emission Analysis of D.I Diesel Engine Running on Honne Oil and Diesel Fuel Blend

In future demand for fossil fuels and environmental effects, a number of renewable sources of energy has been studied in worldwide. An attempt is made to apt of vegetable oil for diesel engine operation, without any chan...

Synthesis and characterization of polyamideimides from diaminobenzophenone-3,3′ ,4,4′ -tetracarboxylic diimides and aromatic dicarboxylic acid— terephthalic acid (TPA)

Four polyamideimides have been synthesized by direct polycondensation of imide containing diamines with dicarboxylic acid- terephthalic (TPA). The diimide-diamines were synthesized from benzophenone-3,3′ ,4,4′ - tetracar...

Improved Technique by Integrating AHP-TOPSIS for Prioritization

Requirements prioritization is used to minimize risk during development of the software project, so that the most important requirements are implemented first. There are many prioritization techniques are available to pr...

Download PDF file
  • EP ID EP221545
  • DOI -
  • Views 134
  • Downloads 0

How To Cite

Ms. Ashwini Walake (2015). Receipt-Free Multi-Authority Voting with (2,2) Secret Sharing Based Authentication. International journal of Emerging Trends in Science and Technology, 2(2), 1786-1791. https://europub.co.uk/articles/-A-221545