Loading

Confidentiality Preserving Instant Runoff Voting System
Reena Kharat1, P. Sanyasi Naidu2, Shital Chattar3 

1Reena Kharat, Department of Computer Science Engineering, GITAM Institute of Technology, GITAM University, Visakhapatnam. Department of Computer, Pimpri Chinchwad College of Engineering, Pune, India.
2P. Sanyasi Naidu, Department of Computer Science Engineering, GITAM Institute of Technology, GITAM University, Visakhapatnam.
3Shital Chattar, Department of Computer, Pimpri Chinchwad College of Engineering, Pune, India.
Manuscript received on 15 March 2019 | Revised Manuscript received on 21 March 2019 | Manuscript published on 30 July 2019 | PP: 6311-6316 | Volume-8 Issue-2, July 2019 | Retrieval Number: B3590078219/2019©BEIESP | DOI: 10.35940/ijrte.B3590.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Voting is a mandatory application in any democratic country for decision making. The E-voting gives the promise or confidence of giving or delivering a convenient, straight forward and economical results. E-Voting system used many cryptographic methods to reduce the security problems in the election process. Voting is one of the essential activity which is used in various applications from student’s secretory elections, reality television shows, to national elections. With the goal of better efficiency, scalability, speed and lower cost, voting is currently changed from paper based to the use of electronic medium. This is targeted to meet better security, such that voting result gives true opinion of the voters. As of late in cryptography a few changes enable us to run troublesome calculations inside the encoded area. In democratic countries like India, Instant Runoff voting method is used in election of the President of India. In IRV, voter can vote by ranking the candidates in order of preference. To protect voter’s privacy, encryption is mostly used to ensure security in open network such as the internet. The cryptosystem based on Elliptic curve cryptography (ECC) is becoming the latest technology of public key cryptography. In proposed E-voting system, voter’s confidentiality is maintained by ECC, blind signature is used for ballot anonymity and authentication. This proposed scheme will effectively ensure confidentiality, anonymity and integrity of ballot in instant runoff voting method.
Index Terms: Online Voting, Encryption, Decryption, Confiden- Tiality, Public Key, Private Key, Authentication Server, vote Counting Server, Ballot, Instant Runoff, Results, Public Key Cryptography, Blind Signature.

Scope of the Article: Authentication, Authorization, Accounting