Trustworthy exams without trusted parties
•An extended list of security requirements for exams with its formal specification in the applied pi-calculus.•An updated exam protocol that meets the extended set of security requirements.•The ProVerif analysis of the updated exam protocol. Historically, exam security has mainly focused on threats...
Gespeichert in:
Veröffentlicht in: | Computers & security 2017-06, Vol.67, p.291-307 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | •An extended list of security requirements for exams with its formal specification in the applied pi-calculus.•An updated exam protocol that meets the extended set of security requirements.•The ProVerif analysis of the updated exam protocol.
Historically, exam security has mainly focused on threats ascribed to candidate cheating. Such threats have been normally mitigated by invigilation and anti-plagiarism methods. However, as recent exam scandals confirm, also invigilators and authorities may pose security threats. The introduction of computers into the different phases of an exam, such as candidate registration, brings new security issues that should be addressed with the care normally devoted to security protocols.
This paper proposes a protocol that meets a wide set of security requirements and resists threats that may originate from candidates as well as from exam administrators. By relying on a combination of oblivious transfer and visual cryptography schemes, the protocol does not need to rely on any trusted third party. We analyse the protocol formally in ProVerif and prove that it verifies all the stated security requirements. |
---|---|
ISSN: | 0167-4048 1872-6208 1872-6208 |
DOI: | 10.1016/j.cose.2016.12.005 |