期刊文献+

使用CCF保护移动代码的实现研究

Implementation Research for Protecting Mobile Code Using CCF
下载PDF
导出
摘要 如何使用加密方法保护智能体不受恶意主机的攻击是近些年来移动智能体安全研究方面的关键问题。最近的基于“加密函数”的计算方法局限于只有智能体的源发处知道计算结果。在文章的前序论文——ProtectingAutonomousAgentsbyUsingCCF中,提出了一种新的方案CCF(Crypto-ComputingwithFeedback,带反馈的加密计算),它支持自治智能体在远程主机上完成安全计算。文章先简单说明CCF的原理,然后介绍实现这一系统的设计方案。 How to use cryptographic methods to protect agent from malicious host is the key issue in the research of mobile agent security,recent approaches based on computing with “encrypted functions” is limited to the case where only the agent originator learns the result of the computation.In our previous paper,a novel approach based on CCF (Crypto-Computing with Feedback) technique is introduced for supporting autonomous agent to accomplish secure computation on the remote hosts.In this paper,we introduce basic theory for CCF briefly,and the implementation for CCF is also presented.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第32期136-138,共3页 Computer Engineering and Applications
关键词 加密 加密电路 自治智能体 带反馈的加密计算 cryptographic method, garbled circuit,autonomous agent, Crypto-Computing with Feedback (CCF)
  • 相关文献

参考文献3

  • 1Huang Shaoying,Huang Changlai,Chen Qi et al.Protecting Autonomous Agents by Using CCF[C].In:Proceedings of The 8th World Multi-Conference on Systemics,Cybernetics and informatics(SCI 2004), Orlando, Florida, USA, 2004-07 : 209-213.
  • 2A C Yao.How to generate and exchange secrets[C].ln:Proc of 27th IEEE Symposium on Foundations of Computer Science(FOCS), 1986 : 162-167.
  • 3T Sander, A Young, M Yung.Non interactive Crypto Computing for NC 1 prepfint,2001.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部