Design and Implementation of an Anonymous and Secure Online Evaluation Protocol

被引:0
|
作者
Petrakos, Nikolaos [1 ]
Monachos, Stefanos [1 ]
Magkos, Emmanouil [2 ]
Kotzanikolaou, Panayiotis [1 ]
机构
[1] Univ Piraeus, Dept Informat, GR-18534 Piraeus, Greece
[2] Ionian Univ, Dept Informat, GR-49100 Corfu, Greece
关键词
anonymity; fairness; cryptography; security; evaluation protocol; ProVerif;
D O I
10.3390/electronics9091415
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Course evaluations have become a common practice in most academic environments. To enhance participation, evaluations should be private and ensure a fair result. Related privacy-preserving method and technologies (e.g., anonymous credentials, Privacy Attribute-Based Credentials, and domain signatures) fail to address, at least in an obvious way, the minimal security and practicality requirements. In this paper, we propose, evaluate, and implement an efficient, anonymous evaluation protocol for academic environments. The protocol borrows ideas from well-known and efficient cryptographic approaches for anonymously submitting ballots in Internet elections for issuing one-time credentials and for anonymously broadcasting information. The proposed protocol extends the above approaches in order to provably satisfy properties such as the eligibility, privacy, fairness and verifiability of the evaluation system. Compared to the state of the art, our approach is less complex and more effective, while security properties of the proposed protocol are verified using the ProVerif cryptographic protocol verifier. A web-based implementation of the protocol has been developed and compared to other approaches and systems.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [11] A secure anonymous voting protocol with a complete supervision
    Jan, JK
    Chen, YY
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2002, 17 (4-5): : 213 - 221
  • [12] A Provably Secure, Lightweight Protocol for Anonymous Authentication
    Katz, Jonathan
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 271 - 288
  • [13] Anonymous Location Aided Secure Routing Protocol
    Manjuladevi, V.
    Bharathi, R. Jennie
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [14] Anonymous Online Registration and Secure Authentication Protocol in Intelligent Vehicular Ad-hoc Networks
    Zhang Xiaojun
    Wang Wenchen
    Fu Hong
    Mu Liming
    Xu Chunxiang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (10) : 3618 - 3626
  • [15] uAuction: Analysis, Design and Implementation of a Secure Online Auction System
    Majadi, Nazia
    Trevathan, Jarrod
    Bergmann, Neil
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 278 - 285
  • [16] SEAS, a secure e-voting protocol: Design and implementation
    Baiardi, F
    Falleni, A
    Granchi, R
    Martinelli, F
    Petrocchi, M
    Vaccarelli, A
    COMPUTERS & SECURITY, 2005, 24 (08) : 642 - 652
  • [17] STAC-Protocol: Secure and Trust Anonymous Communication Protocol for IoT
    Jebri, Sarra
    Abid, Mohamed
    Bouallegue, Ammar
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 365 - 370
  • [18] Anonymous simple secure m-commerce protocol
    Haddad, E
    King, B
    PSC '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON PERVASIVE SYSTEMS AND COMPUTING, 2005, : 199 - 205
  • [19] An Improved Secure Anonymous Protocol for Distributed Computer Networks
    Chain, Kai
    Kuo, Wen-Chung
    Cheng, Jiin-Chiou
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 141 - 149
  • [20] An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications
    Park, Youngho
    Sur, Chul
    Jung, Chae Duk
    Rhee, Kyung-Hyune
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (03) : 785 - 800