Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2015
DOI: 10.1007/978-3-319-25645-0_19
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous Evaluation System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…In the online educational evaluation system of [17], Attribute Based Credentials [15] were employed to allow students to evaluate, anonymously, the competence of the subjects they have selected. Privacy ABCs, as most anonymous credentials instantiations, rely on user's hardware and employ cryptographic constructs which are considered to be heavy with respect to computation and storage [2,19]. Having said that, in recent years there have been attempts to improve their practicality, e.g., [20,21], however much work is still needed before anonymous credentials are considered practical.…”
Section: Related Work On Anonymous Evaluation Systemsmentioning
confidence: 99%
See 3 more Smart Citations
“…In the online educational evaluation system of [17], Attribute Based Credentials [15] were employed to allow students to evaluate, anonymously, the competence of the subjects they have selected. Privacy ABCs, as most anonymous credentials instantiations, rely on user's hardware and employ cryptographic constructs which are considered to be heavy with respect to computation and storage [2,19]. Having said that, in recent years there have been attempts to improve their practicality, e.g., [20,21], however much work is still needed before anonymous credentials are considered practical.…”
Section: Related Work On Anonymous Evaluation Systemsmentioning
confidence: 99%
“…In the anonymous evaluation system proposed by Kluczniak et al [2], an evaluator i registers her standard DSA public signature keys (in the form of PK i ← g x i ) to the Registration Server (controlled by the University), and then uses her corresponding private keys x i to authenticate their evaluations. To protect the evaluators' anonymity, the Questionnaire Server receives a list of randomized public keys (i.e., a white list), in the form of R(PK i ) ← (g x i ) r , where the randomizing exponent r is the product of powers r j , j = 1, ..., n shared between the Registration Server and several n Mixers (controlled bu the students' Council), where n ≥ 1.…”
Section: Related Work On Anonymous Evaluation Systemsmentioning
confidence: 99%
See 2 more Smart Citations