Skip to main content

Design of a Privacy-Preserving Document Submission and Grading System

  • Conference paper
Secure IT Systems (NordSec 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9417))

Included in the following conference series:

  • 1186 Accesses

Abstract

Document submission and grading systems are commonly used in educational institutions. They facilitate the hand-in of assignments by students, the subsequent grading by the course teachers and the management of the submitted documents and corresponding grades. But they might also undermine the privacy of students, especially when documents and related data are stored long term with the risk of leaking to malicious parties in the future.We propose a protocol for a privacy-preserving, anonymous document submission and grading system based on blind signatures. Our solution guarantees the unlinkability of a document with the authoring student even after her grade has been reported, while the student can prove that she received the grade assigned to the document she submitted. We implemented a prototype of the proposed protocol to show its feasibility and evaluate its privacy and security properties.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer US (1982)

    Google Scholar 

  2. Dey, A., Weis, S.: PseudoID: Enhancing privacy in federated login. In: Hot Topics in Privacy Enhancing Technologies, pp. 95–107 (2010). http://www.pseudoid.net

  3. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: SSYM Proceedings, vol. 13. p. 21. USENIX Association, USA (2004)

    Google Scholar 

  4. Free Software Foundation (FSF): Libgcrypt (2007). http://www.gnu.org/software/libgcrypt/

  5. Freedom of the Press Foundation (FPF): SecureDrop (2013). https://securedrop.org/

  6. French Institute for Research in Computer Science and Automation (INRIA): Taler (2015). http://www.taler.net

  7. Hayes, P.D.: CryptoBallot (2013). https://cryptoballot.com/

  8. Hermes Center for Transparency and Digital Human Rights: GlobaLeaks (2011). https://www.globaleaks.org/

  9. Stamatiou, Y., et al.: Course evaluation in higher education: the patras pilot of ABC4Trust. In: Rannenberg, K., Camenisch, J., Sabouri, A. (eds.) Attribute-based Credentials for Trust, pp. 197–239. Springer International Publishing (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Greschbach, B., Rodríguez-Cano, G., Ericsson, T., Buchegger, S. (2015). Design of a Privacy-Preserving Document Submission and Grading System. In: Buchegger, S., Dam, M. (eds) Secure IT Systems. NordSec 2015. Lecture Notes in Computer Science, vol 9417. Springer, Cham. https://doi.org/10.1007/978-3-319-26502-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26502-5_5

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26501-8

  • Online ISBN: 978-3-319-26502-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics