Abstract
Although several exam systems are available, the Huszti-Pethő [HP10] exam was the first protocol proposed in the literature that focused on authentication and privacy requirements, even in the presence of corrupted candidates and exam authorities. Since no formal proof that guarantees the security of the protocol has been advanced so far, we take it as an opportunity to validate our model for secure exams.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Giustolisi, R. (2018). The Huszti-Pethő Protocol. In: Modelling and Verification of Secure Exams. Information Security and Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-319-67107-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-67107-9_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67106-2
Online ISBN: 978-3-319-67107-9
eBook Packages: Computer ScienceComputer Science (R0)