Cryptographic security for mobile code

被引:42
|
作者
Algesheimer, J [1 ]
Cachin, C [1 ]
Camenisch, J [1 ]
Karjoth, G [1 ]
机构
[1] IBM Corp, Zurich Res Lab, CH-8803 Ruschlikon, Switzerland
关键词
D O I
10.1109/SECPRI.2001.924283
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the protection of mobile code against cheating and potentially malicious hosts. We point our that the recent approach based on computing with "encrypted functions" is limited to the case where only the code originator learns the result of the computation and the host running the code must not notice anything at all. We argue that if the host is to receive some output of the computation, then securing mobile code requires minimal trust in a third party. Tamper-proof hardware installed on each host has been proposed for this purpose. In this paper we introduce a new approach for securely executing (fragments of) mobile code that relies on a minimally trusted third party. This party is a generic independent entity, called the secure computation service, which performs some operations on behalf of the mobile application, but does not learn anything about the encrypted computation. Because it is universal, the secure computation service needs to be only minimally trusted and can serve many different applications. We present a protocol based on tools from theoretical cryptography that is quire practical for computing small functions.
引用
收藏
页码:2 / 11
页数:10
相关论文
共 50 条
  • [31] TINMAN: A resource bound security checking system for mobile code
    Mok, AK
    Yu, WJ
    COMPUTER SECURITY - ESORICS 2002, PROCEEDINGS, 2002, 2502 : 178 - 193
  • [32] Mobile code security by Java']Java bytecode dependence analysis
    Bian, G
    Nakayama, K
    Kobayashi, Y
    Maekawa, M
    IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 923 - 926
  • [33] Cloud Computing Security Enhancement by Using Mobile PIN Code
    Alhadidi, Basim
    Arabeyat, Zahraa
    Alzyoud, Fesal
    Alkhwaldeh, Ali
    JOURNAL OF COMPUTERS, 2016, 11 (03) : 225 - 231
  • [34] Using reflection as a mechanism for enforcing security policies in mobile code
    Welch, I
    Stroud, RJ
    COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 309 - 323
  • [35] Security risks in java-based mobile code systems
    Faculty of Informatics, University of Lugano, Lugano, Switzerland
    不详
    CA, United States
    Scalable Comput. Pract. Exp., 2006, 4 (1-11):
  • [36] A trusted source-based model of mobile code security
    Liu, Wei-Wei
    Li, Xiao-Yong
    Han, Zhen
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2154 - 2157
  • [37] On the Security Loss in Cryptographic Reductions
    Lu, Chi-Jen
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 72 - 87
  • [38] Hiding Cliques for Cryptographic Security
    Ari Juels
    Marcus Peinado
    Designs, Codes and Cryptography, 2000, 20 : 269 - 280
  • [39] Security and cryptographic hardware implementations
    Sklavos, N
    Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 768 - 769
  • [40] CRYPTOGRAPHIC TECHNIQUES AND NETWORK SECURITY
    AYOUB, F
    SINGH, K
    IEE PROCEEDINGS-F RADAR AND SIGNAL PROCESSING, 1984, 131 (07) : 684 - 694