Cryptographic security for mobile code

被引:42
|
作者
Algesheimer, J [1 ]
Cachin, C [1 ]
Camenisch, J [1 ]
Karjoth, G [1 ]
机构
[1] IBM Corp, Zurich Res Lab, CH-8803 Ruschlikon, Switzerland
关键词
D O I
10.1109/SECPRI.2001.924283
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the protection of mobile code against cheating and potentially malicious hosts. We point our that the recent approach based on computing with "encrypted functions" is limited to the case where only the code originator learns the result of the computation and the host running the code must not notice anything at all. We argue that if the host is to receive some output of the computation, then securing mobile code requires minimal trust in a third party. Tamper-proof hardware installed on each host has been proposed for this purpose. In this paper we introduce a new approach for securely executing (fragments of) mobile code that relies on a minimally trusted third party. This party is a generic independent entity, called the secure computation service, which performs some operations on behalf of the mobile application, but does not learn anything about the encrypted computation. Because it is universal, the secure computation service needs to be only minimally trusted and can serve many different applications. We present a protocol based on tools from theoretical cryptography that is quire practical for computing small functions.
引用
收藏
页码:2 / 11
页数:10
相关论文
共 50 条
  • [21] Security and Network Performance Evaluation of KK' Cryptographic Technique in Mobile Adhoc Networks
    Singh, Yudhvir
    Chaba, Yogesh
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1151 - 1156
  • [22] Redesigning QR Code Ecosystem with Improved Mobile Security
    Yin, L. Roger
    Zhou, Jiazhen
    Hsu, Maxwell K.
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 678 - 679
  • [23] Mobile code security by Java']Java bytecode instrumentation
    Chander, A
    Mitchell, JC
    Shin, I
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 27 - 40
  • [24] A Father/Foster security protocol for mobile agent code
    Al-Saedy, Hasan
    INFORMATION MANAGEMENT IN THE NETWORKED ECONOMY: ISSUES & SOLUTIONS, 2007, : 46 - 50
  • [25] Addressing security issues in programming languages for mobile code
    Gritzalis, S
    Iliadis, J
    NINTH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 1998, : 288 - 293
  • [26] The Security of Cryptographic Hashes
    Teat, Chad
    Peltsverger, Svetlana
    PROCEEDINGS OF THE 49TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE (ACMSE '11), 2011, : 103 - 108
  • [27] Automating Cryptographic Code Generation
    Yarom, Yuval
    PROCEEDINGS OF THE 2022 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2022, 2022, : 3 - 3
  • [28] Verified Cryptographic Code for Everybody
    Boston, Brett
    Breese, Samuel
    Dodds, Joey
    Dodds, Mike
    Huffman, Brian
    Petcher, Adam
    Stefanescu, Andrei
    COMPUTER AIDED VERIFICATION (CAV 2021), PT I, 2021, 12759 : 645 - 668
  • [29] Combining cryptographic and steganographic security with self-wrapped optical code division multiplexing techniques
    Huang, Y. -K.
    Wu, B.
    Glesk, I.
    Narimanov, E. E.
    Wang, T.
    Prucnal, P. R.
    ELECTRONICS LETTERS, 2007, 43 (25) : 1449 - 1451