Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
4955517 | Computers & Security | 2017 | 39 Pages |
Abstract
This paper proposes a protocol that meets a wide set of security requirements and resists threats that may originate from candidates as well as from exam administrators. By relying on a combination of oblivious transfer and visual cryptography schemes, the protocol does not need to rely on any trusted third party. We analyse the protocol formally in ProVerif and prove that it verifies all the stated security requirements.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Y.A. Ryan,