Abstract

this article presents an encryption system which has many characteristics, like anonymity, originality, correctness, confidentiality, durability and confirmation as well as no need to any trusted authority. Besides that the submitted system gives an evidence of the successful submission by using anonymity property. Additional to use the anonymous return channel, also use the timed-based solution. The proposed system has been implemented and its results were measured. The preliminary findings in this paper seem very promising. Also, the results show that the system is applicable and will yield good results if applied to new generations of mobile phones. Furthermore, the results show that the method is more efficient and faster than the system already in place.

Highlights

  • In this time, teaching via the programmed systems have fall a new subject because the e-test is the tricky topic in e-learning systems

  • The proposed scheme employs the authentication protocol because it guarantees that cannot manipulate, where a holder of a secret key cannot award the key to others. This technique will allow to the new scheme to discover the fraud, since a private key is utilized in one test only and will destroy by itself

  • The alias is Built by the way that exam manger can check the identity of the participant, and the eligibility for taking the test or correcting the exam paper

Read more

Summary

Introduction

In this time, teaching via the programmed systems have fall a new subject because the e-test is the tricky topic in e-learning systems. The proposed scheme employs the authentication protocol because it guarantees that cannot manipulate, where a holder of a secret key cannot award the key to others. This technique will allow to the new scheme to discover the fraud, since a private key is utilized in one test only and will destroy by itself. The student will receive the result and will be concerned on restoring his original id To educator this is not needful, his genuine id must continue confidential. In 2006, Jordi Castella-Roca et al [4] proposed an e-test scheme, includes three main participants, the exam manager, teacher and student. Many e-exam systems are available these days in the markets, but without illustration its security ranks and without mentioned anything about its application problems [5]

The E-exam Systems
The Security Features
The Elements
Remark
Preliminaries
The reusable anonymous return channel
Time-based solution
The Proposed E-Exam System
Initialization phase
Testing phase
Marking phase
G S mod n
Security discussion
Remarks
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.