Cryptographic security for mobile code

被引:42
|
作者
Algesheimer, J [1 ]
Cachin, C [1 ]
Camenisch, J [1 ]
Karjoth, G [1 ]
机构
[1] IBM Corp, Zurich Res Lab, CH-8803 Ruschlikon, Switzerland
关键词
D O I
10.1109/SECPRI.2001.924283
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the protection of mobile code against cheating and potentially malicious hosts. We point our that the recent approach based on computing with "encrypted functions" is limited to the case where only the code originator learns the result of the computation and the host running the code must not notice anything at all. We argue that if the host is to receive some output of the computation, then securing mobile code requires minimal trust in a third party. Tamper-proof hardware installed on each host has been proposed for this purpose. In this paper we introduce a new approach for securely executing (fragments of) mobile code that relies on a minimally trusted third party. This party is a generic independent entity, called the secure computation service, which performs some operations on behalf of the mobile application, but does not learn anything about the encrypted computation. Because it is universal, the secure computation service needs to be only minimally trusted and can serve many different applications. We present a protocol based on tools from theoretical cryptography that is quire practical for computing small functions.
引用
收藏
页码:2 / 11
页数:10
相关论文
共 50 条
  • [1] Mobile code and security
    Reliable Software Technologies
    IEEE Internet Comput, 6 (26-29):
  • [2] Mobile code security
    AT&T Labs-Research
    IEEE Internet Comput, 6 (30-34):
  • [3] Mobile code security
    Rubin, AD
    Geer, DE
    IEEE INTERNET COMPUTING, 1998, 2 (06) : 30 - 34
  • [4] Mobile code security
    Srikumar, R
    OPTOELECTRONIC AND WIRELESS DATA MANAGEMENT, PROCESSING, STORAGE, AND RETRIEVAL, 2001, 4534 : 47 - 54
  • [5] Mobile code and security
    McGraw, G
    Felten, EW
    IEEE INTERNET COMPUTING, 1998, 2 (06) : 26 - 29
  • [6] Cryptographic Turbo Code for Image Transmission over Mobile Networks
    Sawant, Vidya
    Bhise, Archana
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 844 - 850
  • [7] Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile data to Cloud
    Sujithra, M.
    Padmavathi, G.
    Narayanan, Sathya
    GRAPH ALGORITHMS, HIGH PERFORMANCE IMPLEMENTATIONS AND ITS APPLICATIONS (ICGHIA 2014), 2015, 47 : 480 - 485
  • [8] Abstract interpretation for mobile code security
    Lu, D
    Nakayama, K
    Kobayashi, Y
    Maekawa, M
    International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, 2005, : 1068 - 1071
  • [9] Mobile code security on destination platform
    Zhu, CZ
    Yin, ZL
    Zhang, AJ
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1263 - 1270
  • [10] Rico: a security proxy for mobile code
    Song, YG
    Fleisch, BD
    COMPUTERS & SECURITY, 2004, 23 (04) : 338 - 351