##plugins.themes.academic_pro.article.main##

Abstract

Election and voting are the important activities in the democratic countries. The traditional voting system becomes inconvenient for the people who cannot visit the polling booth for the vote casting. To overcome the drawback of traditional voting system web based voting systems are introduced. Security is an important issue in the web based voting system. The proposed system provides secured  authentication through the visual secret sharing scheme.

Keywords: Secret Sharing, Visual cryptography, Shares, Authentication.

##plugins.themes.academic_pro.article.details##

Author Biographies

Ms. Ashwini Walake, B.D.C.O.E. Sewagram Pin code-442001

Student-M.Tech.(CSE)

Prof. Ms. Pallavi Chavan, B.D.C.O.E. Sewagram Pin code-442001

Assistant Professor (Sr.Gr.),
How to Cite
Walake, M. A., & Chavan, P. M. P. (2015). Receipt-Free Multi-Authority Voting system with (2,2) Secret Sharing Based Authentication. International Journal of Emerging Trends in Science and Technology, 2(02). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/479

References

1. Kh. Manglem Singh, Sukumar Nandi, S. Birendra Singh, L. Shyamsundar Singh.”Stealth steganography in visual cryptography for HalfTone Images”, proceeding of the International Conference on Computer and communication Engineering,2008,IEEE. pp. 1217-1221.
2. P.S. Revankar, Anisa Anjum, W.Z. Gandhare,”Secure Iris Authentication using Visual Cryptography”, IJCSIS, Vol. 7, No. 3,2010, pp. 217-221.
3. Mrs. A. Vinodini, M. Premanand, M. Natarajan,”Visual Cryptography Using Two factor Biometric System for Trustworthy Authentication”, International Journal of scientific and Research Publication, vol. 2,Issue 3, March 2012,pp. 1-5.
4. R. Yadagiri Rao,”Secure Visual Cryptography ”,International Journal of Engineering and Computer Science, vol. 2, Issue 1, Jan. 2013,pp. 265-303.
5. B. Priyanka, E. Purushottam,”A survey on Authentication for Grayscale Images Based on Visual Cryptographic Technique”, International Journal of Modern Engineering Research, vol. 3, Issue. 1, Jan. – Feb. 2013, pp. 354-359.
6. S. Kavitha Murugesan, Shanavas K. A. “Secure Image Authentication of a Grayscale document using Secret Sharing Method and Chaotic Logistic Map with Data Repair Capability”, International Journal of Innovative Technology and Exploring Engg., vol. 2, Issue. 6,May. 2013, pp. 232-235.
7. Mrs. Angel Freeda, M. Sindhuja, K.Sujitha,”Image Captcha Based Authentication using Visual Cryptography”, International Journal of Research in Engineering and Advance Technology, Vol. 1, Issue 2, April- May 2013, pp. 1-6.
8. Pooja,Dr. Lalitha Y.S,”Non Expanded Visual Cryptography for Color Images using Psuedo- Randomized Authentication”, International Journal of Engineering research and development, Vol. 10, Issue 6, June 2014, pp. 1-8.
9. Adi Shamir, 1979, “How to Share a Secret”, in Communications of ACM, Vol.22, no.11, pp. 612-613.
10. R. Cramer, R. Gennaro and B. Schoenmakers, 1997,”A Secure and optimally Efficient Multi- Authority Election scheme” in EUROCRYPT 97, LNCS 1233,Springer-verlag,pp.103-118.