vide fairness to both the examiner and the candidate,
but it was also taken as a stimulating research chal-
lenge. In fact, it was somewhat surprising to find out
that no attempts existed at tackling the problem using
computers, as there was no public availability of the
only related publication (Gray, 2003), which was just
about to appear (§2). Our efforts to study the prob-
lem from a security perspective produced the first beta
version of WATA, a system for Written Authenticated
Though Anonymous exams, which has recently met a
stable Java implementation, as we shall see below.
The gist of WATA is to mechanise in a software
the classical method of the double envelope, which is
often used during open competitions. As we detailed
below, because this system classically has no com-
puter support, it is easy for a dishonest examiner to
subvert it. The main idea is to authenticate each exam
sheet conventionally, but to keep it anonymous for the
examiner until he terminates his marking. The only
real limitation of WATA is against a scenario where
the candidate and the examiner collude to subvert the
exam. This seems, however, rather extreme, and may
as such require dedicated enforcement.
This manuscript begins with a survey of the re-
lated work (§2). It then describes WATA (§3), illus-
trates its interface (§4) and outlines its implementa-
tion (§5). Finally, it terminates (§6).
2 RELATED WORK
As mentioned above, only two significant works are
related to ours at present. One is the double paper
envelope, which is a classical attempt at conjugating
authentication and anonymity without computer sup-
port. Two envelopes are used for each candidate. A
big one, which must be anonymous, will contain his
exam sheet. A small one will contain only the can-
didate personal information. When the candidate fin-
ishes his exercises, the examiner puts the exam sheet
inside the big envelop, whereas his personal informa-
tion gets sealed in the small envelop — sealing-wax
could be used to make the small envelop more tamper-
proof. During the marking phase, the examiner will
open only the big envelop in order to mark an anony-
mous exam sheet. Only afterwards, when the exam-
iner will have marked the exam sheet, he will asso-
ciate the anonymous sheet with the personal informa-
tion of the candidate by opening the small envelop.
This terminates the marking phase, which is authenti-
cated though anonymous only if the examiner is hon-
est.
Clearly, a dishonest examiner could easily violate
the anonymity of the exam sheet. If he is not super-
vised by someone else, or if all members of the exam-
ining committee agree, he/they can decide to open the
small envelope beforehand, and dishonestly advan-
tage or disadvantage some candidate. Various cheat-
ing scenarios could take place, especially if the small
envelop is weakly sealed, because anyone in the ex-
amining committee could open and close it without
any apparent tampering. As mentioned, sealing-wax
would be of some help here.
Another related work is a software to sub-
mit coursework in an electronically from the stu-
dent to the examiner while maintaining the student
anonymous (Gray, 2003). Based on the client-
server paradigm, the system lets the student use a
pseudonym to submit his coursework. This process
is mechanised through a JAVA (Microsystems, 1991)
application, which keeps the identity of the student
from the examiner. The latter is therefore deemed to
mark the coursework fairly. Only when the course
(that is, the actual teaching classes) terminates, will
the examiner associate the pseudonym with the real
identity. The system has weaknesses, as the author
himself says; for example, a student could submit
his coursework with his personal information in or-
der to invalidate the anonymity of his work. This may
happen either deliberately or indeliberately, that is by
mistake. It remains questionable, however, whether
this qualifies as a significant weakness in a realistic
threat model where the student has interest in con-
forming to the rules in order to get through the exam.
The goals of this system are rather different from
WATA’s. Rather than assisting with coursework sub-
mission prior to the end of teaching, when anonymity
is relaxed, WATA is targeted at exams whose marks
must be produced in due time, as is the case of open
competitions or final exams of university courses, for
example. Another difference is that WATA is a tool
for the examiner and, as such, does not need to be
distributed.
3 OUR SOLUTION: WATA
In this Section, we advance a system called WATA. It
is a system for Written Authenticated Though Anony-
mous exams, which offers an examiner full computer
support to print, mark and notify the marks of exam
sheets that are anonymous though still authenticated.
Anonymity is relaxed only at the final phase of mark
notification, that is after the actual marking phase.
WATA is an application software that accomplishes its
goals by printing exam sheets with a particular layout.
WATA - A System for Written Authenticated though Anonymous Exams
133