Design and Implementation of an Anonymous and Secure Online Evaluation Protocol

被引:0
|
作者
Petrakos, Nikolaos [1 ]
Monachos, Stefanos [1 ]
Magkos, Emmanouil [2 ]
Kotzanikolaou, Panayiotis [1 ]
机构
[1] Univ Piraeus, Dept Informat, GR-18534 Piraeus, Greece
[2] Ionian Univ, Dept Informat, GR-49100 Corfu, Greece
关键词
anonymity; fairness; cryptography; security; evaluation protocol; ProVerif;
D O I
10.3390/electronics9091415
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Course evaluations have become a common practice in most academic environments. To enhance participation, evaluations should be private and ensure a fair result. Related privacy-preserving method and technologies (e.g., anonymous credentials, Privacy Attribute-Based Credentials, and domain signatures) fail to address, at least in an obvious way, the minimal security and practicality requirements. In this paper, we propose, evaluate, and implement an efficient, anonymous evaluation protocol for academic environments. The protocol borrows ideas from well-known and efficient cryptographic approaches for anonymously submitting ballots in Internet elections for issuing one-time credentials and for anonymously broadcasting information. The proposed protocol extends the above approaches in order to provably satisfy properties such as the eligibility, privacy, fairness and verifiability of the evaluation system. Compared to the state of the art, our approach is less complex and more effective, while security properties of the proposed protocol are verified using the ProVerif cryptographic protocol verifier. A web-based implementation of the protocol has been developed and compared to other approaches and systems.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [1] Design and implementation of an online anonymous feedback system
    Inshi, Saad
    Youssef, Amr
    2008 24TH BIENNIAL SYMPOSIUM ON COMMUNICATIONS, 2008, : 58 - 61
  • [2] DESIGN AND IMPLEMENTATION OF A SECURE MODBUS PROTOCOL
    Fovino, Igor Nai
    Carcano, Andrea
    Masera, Marcelo
    Trombetta, Alberto
    CRITICAL INFRASTRUCTURE PROTECTION III, 2009, 311 : 83 - 96
  • [3] Design and implementation of a secure mobile IP protocol
    Mufti, M
    Khanum, A
    2004 INTERNATIONAL NETWORKING AND COMMUNICATIONS CONFERENCE, PROCEEDINGS, 2004, : 53 - 57
  • [4] Design and Implementation of a Secure Online Lottery System
    Kuacharoen, Pramote
    ADVANCES IN INFORMATION TECHNOLOGY, 2012, 344 : 94 - 105
  • [5] A Secure Electronic Payment Protocol Design and Implementation
    El Ismaili, Houssam
    Houmani, Hanane
    Madroumi, Hicham
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (05): : 76 - 84
  • [6] Anonymous and secure electronic transaction protocol
    Brlek, S
    Hamadou, S
    Mullins, J
    ANNALS OF TELECOMMUNICATIONS, 2005, 60 (5-6) : 530 - 557
  • [7] Anonymous and secure electronic transaction protocol
    Brlek, Srecko
    Hamadou, Sardaouna
    Mullins, John
    Annales des Telecommunications/Annals of Telecommunications, 2005, 60 (5-6): : 530 - 557
  • [8] A Secure Anonymous Routing Protocol in WSN
    Yang, Guang
    Geng, Guining
    Song, Jing
    Liu, Zhaohui
    Han, He
    Gao, Xiangang
    2013 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION (ICIA), 2013, : 415 - 418
  • [9] A Secure Electronic Transaction Payment Protocol Design and Implementation
    El Ismaili, Houssam
    Houmani, Hanane
    Madroumi, Hicham
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (05) : 172 - 180
  • [10] Design and implementation of a Secure Bandwidth Broker Discovery Protocol
    Okumus, Ibrahim Taner
    Cekerekli, Sezgin
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (02) : 231 - 237