期刊文献+

基于加乘同态与组合函数技术的MA保护研究 被引量:4

Research of MA Protection Based on Addition-multiplication Homomorphism and Composite Function Technology
下载PDF
导出
摘要 针对移动代理在异质网络环境中的安全问题,提出一种基于加乘同态与组合函数加密策略的MA保护方案,同态思想应用于移动密码学中,不用解密即可使加密任务代理在其它网络平台上运行.该方案在同态的基础上引入了加乘同态加密策略,采用了加乘同态加密三地址码操作数,组合函数加密三地址码操作码的加密步骤,并在加密后排除了由加乘同态与组合函数引起的双重加密问题.最后给出了该方案的正确性及安全性验证.实验结果表明:对比同态加密方法,该方案节省执行时间5.12秒,并能及时侦测出恶意主机. Addition-multiplication homomorphism and composite function encryption protecting scheme is put forward,aiming to solve the security problems of Mobile agents(MA) migrating across heterogeneous network execution environments.Homomorphism idea is applied to mobile cryptography,and encrypted mobile codes can be executed directly on different platforms without decryption.Addition-multiplication homomorphism(AMH) and composite function encryption strategies are introduced here,and encrypting steps are used as follows:first three address operands are encrypted by Addition-multiplication homomorphism method,then three address operating codes are encrypted by composite function method,double encryption problems are considered at last,and eliminating the statements that are encrypted by both AMH and composite function methods.Correctness and security are verified in this scheme.Experimental results show:By contrast to homomorphism encryption method,nearly 5.12s executing time will be saved using this addition-multiplication homomorphism and composite function encryption scheme,and malicious hosts are detected timely.
出处 《小型微型计算机系统》 CSCD 北大核心 2012年第10期2223-2226,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61170185)资助 辽宁省科技厅博士启动基金项目(20101082)资助 辽宁省教育厅科学技术基金项目(L2011030)资助
关键词 移动代理 加乘同态 组合函数 主动保护 时间核查 mobile agent addition-multiplication homomorphism composite function active protection time checking
  • 相关文献

参考文献10

  • 1Sander T, Tschudin C. Towards mobile cryptography [ A]. In Pro- ceedings of the IEEE Symposium on Security and Privacy, Oakland [ C ]. CA, IEEE Computer Society Press, 1998.
  • 2Chen Liang. Research on techniques securing mobile code based on homomorphic encryption [ D ]. South China University of Technolo- gy, 2009.
  • 3赵洋,蓝天,马新新,张凤荔.基于加同态公钥密码体制的两方安全议价协议[J].计算机应用,2006,26(11):2576-2577. 被引量:3
  • 4Topaloglu U,Bayrak C. Secure mobile agent execution in virtual en- vironment enhanced [ J ]. Autonomous Agents and Multi-Agent Sys- tems,2008,16( 1 ) :1-12.
  • 5Jason C Hung, Han-Bin Chang, Hsuan-Pu Chang, et al. Evolution of ubiquitous autonomous agents [J] . International Journal of AdHoe and Ubiquitous Computing, 2009,4 ( 6 ) : 334 -343.
  • 6Richard Ssekibuule. Mobile agent security against malicious plat- forms [ J]. Cybernetics and Systems ,2010,41 (7) :522-534.
  • 7Ching Lin,Vijay Varadharajan. MobileTrust:a trust security archi- tecture for mobile agent systems [ J ] International Joumai of Infor- marion Security,2010,9 (3) : 153-178.
  • 8Woei-Jiunn Tsaur, Chien-Hao Ho. A mobile agent protected scheme using pairing-based cryptosystems [ J]. International Journal of Mo- bile Communications,2005, 3 (2) : 183-196.
  • 9Apostolos P Foumaris. Trust ensuring crisis management hardware module [ J ]. Information Security Journal: A Global Perspective, 2010,19(2) :74-83.
  • 10吴杰宏,常桂然,高福祥,尹航.基于数据迷乱和时间核查技术的移动代理保护的研究[J].计算机研究与发展,2009,46(3):363-369. 被引量:2

二级参考文献24

  • 1陈志,王汝传.移动代理网络管理模型的安全性研究[J].南京邮电学院学报(自然科学版),2004,24(2):70-75. 被引量:6
  • 2Silva L M, Simoes P, Soares G, et al. JAMES: A platform for mobile agents for the management of telecommunication networks[G]//LNCS 1699: Proc of the 3rd Int Workshop on Intelligent Agents for Telecommunication Applications. Berlin: Springer, 1999:77-95
  • 3Fuggetta A, Picco G P, Vigna G. Understanding code mobility [J]. IEEE Trans on Software Engineering, 1998, 24(5) : 342-361
  • 4Hohl F. Time limited blackbox security: Protecting mobile agents from malicious hosts [G] //LNCS 1419: Proc of Mobile Agents and Security. Berlin: Springer, 1998
  • 5Esparza O, Soriano M, Munoz J L, et al. Implementation and performance evaluation of protocol for detecting suspicious hosts [G]//LNCS 2881: Proc of Mobile Agents for Telecommunication Applications. Berlin: Springer, 2003
  • 6Vigna G. Cryptographic traces for mobile agents [G] //LNCS 1419: Proc of Mobile Agents and Security. Berlin: Springer, 1998:137-153
  • 7Farmer W, Guttman J, Swarup V. Security for mobile agents: Authentication and state appraisal [G]//LNCS 1146: Proc of the 4th European Symp on Research in Computer Security (ESORICS). Berlin: Springer, 1996: 118-130
  • 8Jansen Wayne A. Intrusion detection with mobile agents [J]. Computer Communications, 2002, 25(15): 1392-1401
  • 9Puliafito A, Tomarchio O. Using mobile agents to implement flexible network management strategies [J]. Computer Communications, 2000, 23(8): 708-719
  • 10Fischmeister S, Vigna G, Kemmerer R A. Evaluating the security of three Java-based mobile agent systems [C]//Proe of the 5th Int Conf on Mobile Agents (MA'01). London: Springer, 2001:31-41

共引文献3

同被引文献28

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部