Abstract
Voter authentication in general election is a very expensive and time-consuming issue. At present, identifying the voter is done through their voter ID cards in the presence of local people and this process leads to malpractice and rigging. Some security algorithms are available in similar areas where identification is required. However, they are found to be failed in many situations. When compared to the existing system, proposed system will give better results by reducing security issues. This introduces concept of voter authentication using modified elliptic curve cryptography where the voter can be authentication over Internet by using public communication channel. Then he can cast his vote through Internet. Elliptic curve cryptography is a public key cryptographic algorithm where it uses couple of keys as private and public. Private key is used by the voter and public key is used to authenticate the voter. The private key in ECC is chosen by using cuckoo search optimization technique instead of randomly choosing the values. The proposed methodology is enhanced using live sample database and is found to be secured by all means.
Please note that the LNCS Editorial assumes that all authors have used the western naming convention, with given names preceding surnames. This determines the structure of the names in the running heads and the author index.
References
Sujatha, K., Nageswara Rao, P.V., Arjuna Rao, A., Rajesh, L.V., Vivek Raja, V.: Secured internet voting system based on combined DSA and multiple DES algorithms. In: ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol II Advances in Intelligent Systems and Computing, vol. 249, pp. 643–650 (2014)
Barthelemy, P., Bertolotti, J., Wiersma, D.S.: A L’evy flight for light. Nature 453, 495–498 (2008)
Yang, X.-S.: Cuckoo Search via Lévy Flights. Department of Engineering, University of Cambridge, Trumpinton Street, Cambridge CB2 1PZ, UK
Amara, M., Siad, A.: Elliptic curve cryptography and its applications. In: 2011 7th International Workshop on Systems, Signal Processing and their Applications (WOSSPA), pp. 247–250 (2011)
Qing, Z., Zhihua, H.: The large prime numbers generation of RSA algorithm based on genetic algorithm. In: 2011 International Conference on Intelligence Science and Information Engineering (ISIE), pp. 434–437 (2011)
Wang, M., Dai, G., Hu, H., Pen, L.: Selection of security elliptic curve based on evolution algorithm. In: CINC ’09. International Conference on Computational Intelligence and Natural Computing, vol. 1, pp. 55–57 (2009)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48,  203–209 (1987)
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) Advances in cryptology-CRYPT0 ’85, LNCS 218, pp. 417–426 (1986). IEEE International Conference, vol. 1, pp. 681–685. IEEE (2011)
Acknowledgements
The authors thank Ms. Madhavi V Lokam for the entire support and facilities provided to us during carrying out this work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sujatha, K., Arjuna Rao, A., Yejarla, P., Sruthi, K.J. (2018). Voter Authentication Using Modified Elliptic Curve Cryptography. In: Satapathy, S., Bhateja, V., Das, S. (eds) Smart Computing and Informatics . Smart Innovation, Systems and Technologies, vol 77. Springer, Singapore. https://doi.org/10.1007/978-981-10-5544-7_48
Download citation
DOI: https://doi.org/10.1007/978-981-10-5544-7_48
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5543-0
Online ISBN: 978-981-10-5544-7
eBook Packages: EngineeringEngineering (R0)