##plugins.themes.academic_pro.article.main##
Abstract
Election and voting are the important activities in the democratic countries. The traditional voting system becomes inconvenient for the people who cannot visit the polling booth for the vote casting. To overcome the drawback of traditional voting system web based voting systems are introduced. Security is an important issue in the web based voting system. The proposed system provides secured  authentication through the visual secret sharing scheme.
Keywords: Secret Sharing, Visual cryptography, Shares, Authentication.
##plugins.themes.academic_pro.article.details##
How to Cite
Walake, M. A., & Chavan, P. M. P. (2015). Receipt-Free Multi-Authority Voting system with (2,2) Secret Sharing Based Authentication. International Journal of Emerging Trends in Science and Technology, 2(02). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/479
References
1. Kh. Manglem Singh, Sukumar Nandi, S. Birendra Singh, L. Shyamsundar Singh.â€Stealth steganography in visual cryptography for HalfTone Imagesâ€, proceeding of the International Conference on Computer and communication Engineering,2008,IEEE. pp. 1217-1221.
2. P.S. Revankar, Anisa Anjum, W.Z. Gandhare,â€Secure Iris Authentication using Visual Cryptographyâ€, IJCSIS, Vol. 7, No. 3,2010, pp. 217-221.
3. Mrs. A. Vinodini, M. Premanand, M. Natarajan,â€Visual Cryptography Using Two factor Biometric System for Trustworthy Authenticationâ€, International Journal of scientific and Research Publication, vol. 2,Issue 3, March 2012,pp. 1-5.
4. R. Yadagiri Rao,â€Secure Visual Cryptography â€,International Journal of Engineering and Computer Science, vol. 2, Issue 1, Jan. 2013,pp. 265-303.
5. B. Priyanka, E. Purushottam,â€A survey on Authentication for Grayscale Images Based on Visual Cryptographic Techniqueâ€, International Journal of Modern Engineering Research, vol. 3, Issue. 1, Jan. – Feb. 2013, pp. 354-359.
6. S. Kavitha Murugesan, Shanavas K. A. “Secure Image Authentication of a Grayscale document using Secret Sharing Method and Chaotic Logistic Map with Data Repair Capabilityâ€, International Journal of Innovative Technology and Exploring Engg., vol. 2, Issue. 6,May. 2013, pp. 232-235.
7. Mrs. Angel Freeda, M. Sindhuja, K.Sujitha,â€Image Captcha Based Authentication using Visual Cryptographyâ€, International Journal of Research in Engineering and Advance Technology, Vol. 1, Issue 2, April- May 2013, pp. 1-6.
8. Pooja,Dr. Lalitha Y.S,â€Non Expanded Visual Cryptography for Color Images using Psuedo- Randomized Authenticationâ€, International Journal of Engineering research and development, Vol. 10, Issue 6, June 2014, pp. 1-8.
9. Adi Shamir, 1979, “How to Share a Secretâ€, in Communications of ACM, Vol.22, no.11, pp. 612-613.
10. R. Cramer, R. Gennaro and B. Schoenmakers, 1997,â€A Secure and optimally Efficient Multi- Authority Election scheme†in EUROCRYPT 97, LNCS 1233,Springer-verlag,pp.103-118.
2. P.S. Revankar, Anisa Anjum, W.Z. Gandhare,â€Secure Iris Authentication using Visual Cryptographyâ€, IJCSIS, Vol. 7, No. 3,2010, pp. 217-221.
3. Mrs. A. Vinodini, M. Premanand, M. Natarajan,â€Visual Cryptography Using Two factor Biometric System for Trustworthy Authenticationâ€, International Journal of scientific and Research Publication, vol. 2,Issue 3, March 2012,pp. 1-5.
4. R. Yadagiri Rao,â€Secure Visual Cryptography â€,International Journal of Engineering and Computer Science, vol. 2, Issue 1, Jan. 2013,pp. 265-303.
5. B. Priyanka, E. Purushottam,â€A survey on Authentication for Grayscale Images Based on Visual Cryptographic Techniqueâ€, International Journal of Modern Engineering Research, vol. 3, Issue. 1, Jan. – Feb. 2013, pp. 354-359.
6. S. Kavitha Murugesan, Shanavas K. A. “Secure Image Authentication of a Grayscale document using Secret Sharing Method and Chaotic Logistic Map with Data Repair Capabilityâ€, International Journal of Innovative Technology and Exploring Engg., vol. 2, Issue. 6,May. 2013, pp. 232-235.
7. Mrs. Angel Freeda, M. Sindhuja, K.Sujitha,â€Image Captcha Based Authentication using Visual Cryptographyâ€, International Journal of Research in Engineering and Advance Technology, Vol. 1, Issue 2, April- May 2013, pp. 1-6.
8. Pooja,Dr. Lalitha Y.S,â€Non Expanded Visual Cryptography for Color Images using Psuedo- Randomized Authenticationâ€, International Journal of Engineering research and development, Vol. 10, Issue 6, June 2014, pp. 1-8.
9. Adi Shamir, 1979, “How to Share a Secretâ€, in Communications of ACM, Vol.22, no.11, pp. 612-613.
10. R. Cramer, R. Gennaro and B. Schoenmakers, 1997,â€A Secure and optimally Efficient Multi- Authority Election scheme†in EUROCRYPT 97, LNCS 1233,Springer-verlag,pp.103-118.