Trustworthy exams without trusted parties

•An extended list of security requirements for exams with its formal specification in the applied pi-calculus.•An updated exam protocol that meets the extended set of security requirements.•The ProVerif analysis of the updated exam protocol. Historically, exam security has mainly focused on threats...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 2017-06, Vol.67, p.291-307
Hauptverfasser: Bella, Giampaolo, Giustolisi, Rosario, Lenzini, Gabriele, Ryan, Peter Y.A.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:•An extended list of security requirements for exams with its formal specification in the applied pi-calculus.•An updated exam protocol that meets the extended set of security requirements.•The ProVerif analysis of the updated exam protocol. Historically, exam security has mainly focused on threats ascribed to candidate cheating. Such threats have been normally mitigated by invigilation and anti-plagiarism methods. However, as recent exam scandals confirm, also invigilators and authorities may pose security threats. The introduction of computers into the different phases of an exam, such as candidate registration, brings new security issues that should be addressed with the care normally devoted to security protocols. This paper proposes a protocol that meets a wide set of security requirements and resists threats that may originate from candidates as well as from exam administrators. By relying on a combination of oblivious transfer and visual cryptography schemes, the protocol does not need to rely on any trusted third party. We analyse the protocol formally in ProVerif and prove that it verifies all the stated security requirements.
ISSN:0167-4048
1872-6208
1872-6208
DOI:10.1016/j.cose.2016.12.005