Design and Implementation of an Anonymous and Secure Online Evaluation Protocol

被引:0
|
作者
Petrakos, Nikolaos [1 ]
Monachos, Stefanos [1 ]
Magkos, Emmanouil [2 ]
Kotzanikolaou, Panayiotis [1 ]
机构
[1] Univ Piraeus, Dept Informat, GR-18534 Piraeus, Greece
[2] Ionian Univ, Dept Informat, GR-49100 Corfu, Greece
关键词
anonymity; fairness; cryptography; security; evaluation protocol; ProVerif;
D O I
10.3390/electronics9091415
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Course evaluations have become a common practice in most academic environments. To enhance participation, evaluations should be private and ensure a fair result. Related privacy-preserving method and technologies (e.g., anonymous credentials, Privacy Attribute-Based Credentials, and domain signatures) fail to address, at least in an obvious way, the minimal security and practicality requirements. In this paper, we propose, evaluate, and implement an efficient, anonymous evaluation protocol for academic environments. The protocol borrows ideas from well-known and efficient cryptographic approaches for anonymously submitting ballots in Internet elections for issuing one-time credentials and for anonymously broadcasting information. The proposed protocol extends the above approaches in order to provably satisfy properties such as the eligibility, privacy, fairness and verifiability of the evaluation system. Compared to the state of the art, our approach is less complex and more effective, while security properties of the proposed protocol are verified using the ProVerif cryptographic protocol verifier. A web-based implementation of the protocol has been developed and compared to other approaches and systems.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [21] A New Secure Anonymous Protocol for Distributed Computer Networks
    Cui Hui
    Cao Tianjie
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 197 - 201
  • [22] On secure and anonymous buyer-seller watermarking protocol
    Deng, Mina
    Preneel, Bart
    2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008), 2008, : 524 - +
  • [23] Implementation of a Secure RFID Protocol
    Baskir, Subutay Giray
    Ors, Berna
    2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2013,
  • [24] Design and Implementation of Inter-operable and Secure Agent Migration Protocol
    Shah, Shakir-Ullah
    Ahmad, Jamil
    Najeeb-ur-Rehman
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (04) : 461 - 470
  • [25] Design and implementation of a secure group communication protocol on a fault tolerant ring
    Saglam, Ö
    Dalkiliç, ME
    Erciyes, K
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, 2003, 2869 : 802 - 810
  • [26] Online Teaching Evaluation System Design and Implementation
    Qi, Baosheng
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON HUMANITIES SCIENCE, MANAGEMENT AND EDUCATION TECHNOLOGY (HSMET 2017), 2017, 96 : 750 - 755
  • [27] Design And Implementation Of An Online Education And Evaluation System
    Bin Azman, Muhammad Azim
    Madzhi, Nina Korlina
    Johari, Juliana
    Buniyamin, Norlida
    PROCEEDINGS OF THE 2017 IEEE 9TH INTERNATIONAL CONFERENCE ON ENGINEERING EDUCATION (IEEE ICEED 2017), 2017, : 248 - 253
  • [28] The design of a secure anonymous Internet voting system
    Chen, YY
    Jan, JK
    Chen, CL
    COMPUTERS & SECURITY, 2004, 23 (04) : 330 - 337
  • [29] Design and evaluation of Adaptive Secure Protocol for e-commerce
    Tak, SW
    Lee, YY
    Park, EK
    Stach, J
    TENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2001, : 32 - 39
  • [30] A Secure Anonymous Path Routing Protocol for Wireless Sensor Networks
    Zhang, Zhiming
    Jiang, Changgen
    Deng, Jiangang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 2, 2010, : 415 - +