Skip to main content

Voter Authentication Using Modified Elliptic Curve Cryptography

  • Conference paper
  • First Online:
Smart Computing and Informatics

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 77))

  • 1285 Accesses

Abstract

Voter authentication in general election is a very expensive and time-consuming issue. At present, identifying the voter is done through their voter ID cards in the presence of local people and this process leads to malpractice and rigging. Some security algorithms are available in similar areas where identification is required. However, they are found to be failed in many situations. When compared to the existing system, proposed system will give better results by reducing security issues. This introduces concept of voter authentication using modified elliptic curve cryptography where the voter can be authentication over Internet by using public communication channel. Then he can cast his vote through Internet. Elliptic curve cryptography is a public key cryptographic algorithm where it uses couple of keys as private and public. Private key is used by the voter and public key is used to authenticate the voter. The private key in ECC is chosen by using cuckoo search optimization technique instead of randomly choosing the values. The proposed methodology is enhanced using live sample database and is found to be secured by all means.

Please note that the LNCS Editorial assumes that all authors have used the western naming convention, with given names preceding surnames. This determines the structure of the names in the running heads and the author index.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Sujatha, K., Nageswara Rao, P.V., Arjuna Rao, A., Rajesh, L.V., Vivek Raja, V.: Secured internet voting system based on combined DSA and multiple DES algorithms. In: ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India-Vol II Advances in Intelligent Systems and Computing, vol. 249, pp. 643–650 (2014)

    Google Scholar 

  2. Barthelemy, P., Bertolotti, J., Wiersma, D.S.: A L’evy flight for light. Nature 453, 495–498 (2008)

    Article  Google Scholar 

  3. Yang, X.-S.: Cuckoo Search via Lévy Flights. Department of Engineering, University of Cambridge, Trumpinton Street, Cambridge CB2 1PZ, UK

    Google Scholar 

  4. Amara, M., Siad, A.: Elliptic curve cryptography and its applications. In: 2011 7th International Workshop on Systems, Signal Processing and their Applications (WOSSPA), pp. 247–250 (2011)

    Google Scholar 

  5. Qing, Z., Zhihua, H.: The large prime numbers generation of RSA algorithm based on genetic algorithm. In: 2011 International Conference on Intelligence Science and Information Engineering (ISIE), pp. 434–437 (2011)

    Google Scholar 

  6. Wang, M., Dai, G., Hu, H., Pen, L.: Selection of security elliptic curve based on evolution algorithm. In: CINC ’09. International Conference on Computational Intelligence and Natural Computing, vol. 1, pp. 55–57 (2009)

    Google Scholar 

  7. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48,  203–209 (1987)

    Google Scholar 

  8. Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) Advances in cryptology-CRYPT0 ’85, LNCS 218, pp. 417–426 (1986). IEEE International Conference, vol. 1, pp. 681–685. IEEE (2011)

    Google Scholar 

Download references

Acknowledgements

The authors thank Ms. Madhavi V Lokam for the entire support and facilities provided to us during carrying out this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Sujatha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sujatha, K., Arjuna Rao, A., Yejarla, P., Sruthi, K.J. (2018). Voter Authentication Using Modified Elliptic Curve Cryptography. In: Satapathy, S., Bhateja, V., Das, S. (eds) Smart Computing and Informatics . Smart Innovation, Systems and Technologies, vol 77. Springer, Singapore. https://doi.org/10.1007/978-981-10-5544-7_48

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5544-7_48

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5543-0

  • Online ISBN: 978-981-10-5544-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics