Mobile code protection with Smartcards

作者: Sergio Loureiro

DOI:

关键词:

摘要: This paper addresses mobile code security with respect to potential integrity and privacy violations originating from the runtime environment. The suggested solution requires a trusted hardware limited capacity like smartcard assures of program executed on untrusted environments by means some interactions between hardware. this scheme is based an extension function hiding using error correcting codes. Unlike prior schemes, proposed technique allows multi-step execution delivery cleartext output at remote site.

参考文章(21)
Henk C. A. van Tilborg, An Introduction to Cryptology ,(1988)
David Chess, Colin Harrison, Aaron Kershenbaum, Mobile agents: Are they a good idea? — update international workshop on mobile object systems. pp. 46- 47 ,(1996) , 10.1007/3-540-62852-5_5
Ingrid Biehl, Bernd Meyer, Susanne Wetzel, Ensuring the Integrity of Agent-Based Computations by Short Proofs Lecture Notes in Computer Science. pp. 183- 194 ,(1998) , 10.1007/BFB0057658
Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán, Protecting the Itinerary of Mobile Agents european conference on object-oriented programming. pp. 301- 301 ,(1998) , 10.1007/3-540-49255-0_79
J. K. Gibson, Equivalent Goppa codes and trapdoors to McEliece's public key cryptosystem theory and application of cryptographic techniques. pp. 517- 521 ,(1991) , 10.1007/3-540-46416-6_46
Tomas Sander, Christian F. Tschudin, On Software Protection via Function Hiding information hiding. pp. 111- 123 ,(1998) , 10.1007/3-540-49380-8_9
Heeralal Janwa, Oscar Moreno, McEliece public key cryptosystems using algebraic-geometric codes international symposium on information theory. ,vol. 8, pp. 293- 307 ,(1995) , 10.1023/A:1027351723034
T. Sander, C.F. Tschudin, Towards mobile cryptography ieee symposium on security and privacy. pp. 215- 224 ,(1998) , 10.1109/SECPRI.1998.674837
Ernest F. Brickell, Breaking iterated knapsacks international cryptology conference. pp. 342- 358 ,(1985) , 10.1007/3-540-39568-7_27
Christian Cachin, Silvio Micali, Markus Stadler, None, Computationally private information retrieval with polylogarithmic communication theory and application of cryptographic techniques. pp. 402- 414 ,(1999) , 10.1007/3-540-48910-X_28