Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol
نویسندگان
چکیده
We introduce the notion of privacy-preserving verifiability for security protocols. It holds when a protocol admits a verifiability test that does not reveal to the verifier about the protocol’s execution more than it needs to know to run the test. Our definition of privacy-preserving verifiability is general and applies to cryptographic protocols as well as human security protocols; however, in this paper we exemplify it in the domain of e-exam systems. We prove that the notion is meaningful: we study an existing exam protocol that is verifiable but lacking verifiability tests which are privacypreserving. We prove that the notion is applicable: we extend the same protocol using functional encryption so that it admits a verifiability test that preserves privacy according to our definition. We further verify in ProVerif that the verifiability holds despite malicious parties and that the new protocol maintains all the security properties that the original protocol enjoyed, so proving that our privacy-preserving verifiability can be achieved from existing security.
منابع مشابه
Remark!: A Secure Protocol for Remote Exams
This paper is about secure remote examination. It presents Remark! , an electronic exam protocol which achieves several authentication, (conditional) anonymity, privacy, and verifiability properties without trusted third parties. Remark! is primarily designed for invigilated Internet-based exams but it also fits computer-based exams with candidates taking their exam in classrooms.
متن کاملVérification automatique de protocoles d'examen, de monnaie, de réputation, et de routage. (Automated Verification of Exam, Cash, aa Reputation, and Routing Protocols)
Security is a crucial requirement in the applications based on information and communication technology, especially when an open network such as the Internet is used. To ensure security in such applications several security protocols have been developed. However, the design of complex security protocols is notoriously difficult and error-prone. Several flaws have been found on protocols that ar...
متن کاملAutomated Verification of Exam , Cash , Reputation , and Routing Protocols
Security is a crucial requirement in the applications based on information and communication technology, especially when an open network such as the Internet is used. To ensure security in such applications several security protocols have been developed. However, the design of complex security protocols is notoriously difficult and error-prone. Several flaws have been found on protocols that ar...
متن کاملERA: Towards privacy preservation and verifiability for online ad exchanges
Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers’ web-pages to advertisers, who want to display ads on ad spaces. However, the parties in an ad auction cannot verify whether the auction is carried out correctly or not. Furthermore, the advertisers are usually u...
متن کاملPrivacy and verifiability in electronic voting
Privacy and verifiability refer to fundamental principles of democratic elections and therefore belong to the set of established security requirements which each electronic voting scheme is expected to meet. However, very different ideas and opinions about privacy and verifiability exist in the scientific community, which shows that both properties are not well understood yet. Moreover, althoug...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017