the examiner knows the personal details (name, sur-
name, etc.) of the examinees as well as which mark
goes to which candidate. The examinees customarily
accept the examiner’s knowledge of such association.
However, knowledge of such association is often
considered sensitive information, such as at public
competitions towards a prestigious post. Also, under-
graduates may feel that disclosing that information to
an examiner cannot be accepted by their righteous pri-
vacy requirements. A potential practical implication
of the disclosure is the examiner’s unfair marking,
which could ultimately hinder meritocracy. Hence
the need for anonymity. By contrast, an anonymous
exam sheet might invite cheating at the examinee’s
side, with a realistic chance of person exchange.
WATA is a system for written, authenticated
though anonymous exams (Bella et al., 2009). It runs
locally on the examiner’s computer, and therefore has
two main limitations: the notification of marks must
be carried out classically, as outlined above; the sys-
tem must be installed on the machine of each exam-
iner who wishes to use it. These motivations con-
vinced us to upgrading the system towards a remote
platform, which any student interested in being no-
tified his mark, or any examiner wishing to use its
facilities might easily access.
However, we soon realised that making the sys-
tem remotely available entails new threats. Not only
are these due to the obvious need to securely com-
municate with a server, but also to the basic design
becoming flawed when hosted on a remote platform.
The main security requirement to meet is examinees’
remote authentication, for at least two reasons. One is
to avoid a clever examinee’s selling his vote to other,
possibly less skilled, examinees.
Another one is due to the fact that certain exam
policies allow examinees to refuse marks till the mo-
ment these are notified. Hence an examinee can
refuse his mark prior to knowing it, while “fail” marks
may officially be accounted for throughout the rest
of his studies. However, once marks are notified,
they cannot be refused and are automatically regis-
tered. The gist of such an exam policy seems to be
to favour examinees’ self evaluation. Therefore, from
our security perspective, lack of examinee authenti-
cation would allow an examinee to illegally register
another examinee’s mark on behalf of the latter. This
would be a serious attack in case the latter examinee,
possibly after pondering his answers, did not want to
have his exam marked.
In consequence, in the new setting, the existing
design of WATA, which was version 2.0, has to be dis-
posed with entirely — more explanation will follow.
Various ideas were tried out towards a new design,
and the exclusive-or function was found to be the right
technology. The main strength of the XOR is the sym-
metry of its truth table, while its drawback is cancel-
lation of the key, which implies the need of fresh keys
every time a new and robust ciphertext must be built.
Barcodes were used in WATA2.0 to match an exam-
inee’s credentials to his exam sheet. Their use in the
new version, which we name WATA3.0, is completely
different: each barcode encodes either the encrypted
version of a set of credentials or the key that must be
used to decipher it.
This paper fully describes the latest version of our
sytem, WATA3.0. A brief history of the previous ver-
sions (§2) introduces the design and user experience
of WATA3.0 (§3). Then, the new interface (§4) and
implementation (§5) are outlined. Some evaluation
(§6) and conclusions (§7) close up.
2 A BRIEF HISTORY OF WATA
The original goal of WATA was to mechanise in a
software the classical method of the double envelope,
which is often used during open competitions. The
examinee inserts his personal details in a small enve-
lope, and seals it. He then inserts that envelope along
with his anonymous, filled-in exam sheet in a bigger
envelope. The examiner is trusted to mark the exam
sheet prior to opening the smaller envelope, when the
association of marks and examinee can be done.
WATA stores the exam questions in a database. It
offers a printing facility to generate as many exam
sheets as needed, with the required number of ques-
tions. These are randomly extracted from the database
and shuffled further to ensure that no two identical
exam sheets exist. A typical exam sheet can be seen in
Figure 1. The security token on the left hand side must
be filled in and signed by the examinee. The examiner
checks this information to match the examinee’s iden-
tification card and finally authenticates the token with
his overlay signature and institution stamp, to make it
physically tamperproof. The two occurrences of the
same barcode can be noted. They will be used later to
match personal details with marks.
The examinee finally tears off the token, hands in
the anonymous manuscript and walks away with the
token. The examiner will mark anonymous sheets and
will organise a mark notification phase as outlined
above. During that phase each examinee will hand
in his token, whose barcode is scanned through an ap-
propriate scanner, entered in WATA2.0 and matched
to a mark that was stored previously: the examiner
stored that mark during the actual marking phase next
to a barcode scanned from an exam sheet. The only
CSEDU 2011 - 3rd International Conference on Computer Supported Education
432