SECURE EVS BY USING BLIND SIGNATURE AND CRYPTOGRAPHY FOR VOTER’S PRIVACY & AUTHENTICATION

Patil V.M.1*
1Department of Computer Science, Shri Shivaji College, Akola-444001, MS, India
* Corresponding Author : vinmpatil2@yahoo.co.in

Received : -     Accepted : -     Published : 15-06-2010
Volume : 1     Issue : 1       Pages : 1 - 6
J Signal Image Process 1.1 (2010):1-6

Cite - MLA : Patil V.M. "SECURE EVS BY USING BLIND SIGNATURE AND CRYPTOGRAPHY FOR VOTER’S PRIVACY & AUTHENTICATION." Journal of Signal and Image Processing 1.1 (2010):1-6.

Cite - APA : Patil V.M. (2010). SECURE EVS BY USING BLIND SIGNATURE AND CRYPTOGRAPHY FOR VOTER’S PRIVACY & AUTHENTICATION. Journal of Signal and Image Processing, 1 (1), 1-6.

Cite - Chicago : Patil V.M. "SECURE EVS BY USING BLIND SIGNATURE AND CRYPTOGRAPHY FOR VOTER’S PRIVACY & AUTHENTICATION." Journal of Signal and Image Processing 1, no. 1 (2010):1-6.

Copyright : © 2010, Patil V.M., Published by Bioinfo Publications. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided the original author and source are credited.

Abstract

In the era of networking and internet we can easily replace the traditional election process with the electronic voting system (EVS). To form the democratic government faith on the election system play a major role and it is also essential. During implementation of EVS we must satisfy all security requirements. Every voter and contesting candidates as well as political party to believe on this system individual and universal verification are also essential. In the proposed protocol we can use the blind signature, pseudo code, dynamic changing vote (dynaVote) etc. to solve the above problem.

References

[1] Subariah Ibrahim, Maznah Kamat, Mazleena Sullab, and shah Rizan Abdul Aziz (2003) 4the National conference on Telecommunication Technology proceedings, Malaysia, 2003 IEEE, 193-197  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[2] Cramer R., Gnnaro R. and Schocnmakers B. and Yong M. (1996) Eurocrypt 9c LNCS 1070, 72-83.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[3] Coranor L.R. and Cytron R.K. (1996) Design and implementation of a practical security conscious Electronic Pollind system, Washington university: Computer science Technical report  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[4] Xiangdong Li, Michael Carliale, Andis C.Kwan, Linlamg Amara Enemuo and Michael Anshel, (2007) An Elementary Electronic voting Protocol using RFID” IEEE  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[5] Sung–Hyon YUN and Sung-Jin LEE . The network Based Electronic voting scheme suitable for large scale election, 218-222  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[6] Orhan Cetinkaya, Ali (2007) International Conference on Availability ,Reliability and security (ARES’07).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[7] Chaum D. (1981) Communication of ACM, 24, 84-88  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[8] Fujioka A. Okamoto T. and Ohta K. (1992) AUSCRYPT’ 92, Australiya, 244-251  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[9] Colin Boyd (1990) In advance in cryptology, proceedings of EUROCRYPT89, LNCS 434, 617-625  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[10] Ahmad Baraani –Destjerdi, Josef Pieprzyk & Reihaneh Satavi-Naini (1995) Proceedings of COMPAC’ 95, 143-148  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[11] Patrick Horster, Markus Michels and Holer Pctousen, (1995) Proceedings of COMPSAC,95, 149-155.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[12] Rivest R., Shamir A. and Tayman Y. (2001) Proceedings of Asiacrypt 2001; Lnecs 2248 Springer Verlag, 552-565  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[13] Desmedt Y. and Frankel Y. (1992) Proceedings, LNCS 576 , Springer-Verlag, 457-469  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[14] Bresson E., Etern J. and Szydlo M. (2002) Crypto 02 LNCS 2442 Springer Veriag, 465- 480  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[15] Whitfield Diffie, Martin E Hellman (1976) IEEE Transactions on Information Theory 22(6), 644-654.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[16] Taher Elgamal (1985) IEEE Transactions on Information Theory 31(4), 469-472  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[17] Sung – Hyon YUM, Sung – Jun LEE (2003) An electronic voting scheme based on undeniable Blind signature scheme 2003, IEEE, 163-167  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[18] Ziangdongli, Michael Carlisle, Andis C. Kwan, Lin Le Ung (2007) IEEE, 234-238  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[19] Alsushi Fajioka, Tatsuaki Okamob. Proceedings & AUSCR YPT 192  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[20] Znen Yu Wu, Fuh Gwo Jeag, Tzer Sh young chen (2006) IEEE, 1351-1353  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[21] Sung Hyun YUN and Sung Jin LEE. The Network Based Electronic Voting Scheme suitable for large scale Election, 218-222  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[22] Hirt M. and Sako K. (2000) EUROCRYPTOO Bruges, Belgium, 539-556  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[23] Juels A., Calalano D. and Jakobsson M. (2005) ACM Workshop on privacy in the Electronic Society, VA, 61-70  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[24] Sung-Hyun YUN, Sung, Jin LEE (2003) IEEE  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[25] Iyappan P., Arivnd K. S., Getha N., Vanitha S. (2009) Emerging Trends in Engineering and Technology ICETET – 09 , 808-812  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[26] Subariah Ibrahim, Mazmah Kamal, Mazleena Salleb and Shah Rizan Abdul Aziz. 4th National Conference an Telecommunication Technology proceedings, Shah Alam, Malaysia  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus