{"title":"移动代理范式中计算结果保护的一种新方法","authors":"Suphithat Songsiri","doi":"10.1109/ISCC.2005.14","DOIUrl":null,"url":null,"abstract":"One of the primary security challenges of the mobile agent paradigm is that of protecting the result of computation carried out by a mobile agent against an attack by a malicious host. There are various proposals that appeared in the literature. Beside their benefits, a well-known vulnerability of their technique is the collusion attack. The collusion attack mainly considered in this paper is the two colluders truncation attack, which could be engendered by the leakage of a one time private key. This paper demonstrates the prevention of the two colluders truncation attack, the detection of other forms of collusion attacks, and the identification of the malicious host. The proposed protocol incorporates and extends the notion of publicly verified chained signature (G. Karjoth, et al., 1998) by using a list of route information and a trusted third party to generate a one time public/private key pair.","PeriodicalId":315855,"journal":{"name":"10th IEEE Symposium on Computers and Communications (ISCC'05)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A new approach for computation result protection in the mobile agent paradigm\",\"authors\":\"Suphithat Songsiri\",\"doi\":\"10.1109/ISCC.2005.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the primary security challenges of the mobile agent paradigm is that of protecting the result of computation carried out by a mobile agent against an attack by a malicious host. There are various proposals that appeared in the literature. Beside their benefits, a well-known vulnerability of their technique is the collusion attack. The collusion attack mainly considered in this paper is the two colluders truncation attack, which could be engendered by the leakage of a one time private key. This paper demonstrates the prevention of the two colluders truncation attack, the detection of other forms of collusion attacks, and the identification of the malicious host. The proposed protocol incorporates and extends the notion of publicly verified chained signature (G. Karjoth, et al., 1998) by using a list of route information and a trusted third party to generate a one time public/private key pair.\",\"PeriodicalId\":315855,\"journal\":{\"name\":\"10th IEEE Symposium on Computers and Communications (ISCC'05)\",\"volume\":\"67 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-06-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"10th IEEE Symposium on Computers and Communications (ISCC'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCC.2005.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"10th IEEE Symposium on Computers and Communications (ISCC'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCC.2005.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A new approach for computation result protection in the mobile agent paradigm
One of the primary security challenges of the mobile agent paradigm is that of protecting the result of computation carried out by a mobile agent against an attack by a malicious host. There are various proposals that appeared in the literature. Beside their benefits, a well-known vulnerability of their technique is the collusion attack. The collusion attack mainly considered in this paper is the two colluders truncation attack, which could be engendered by the leakage of a one time private key. This paper demonstrates the prevention of the two colluders truncation attack, the detection of other forms of collusion attacks, and the identification of the malicious host. The proposed protocol incorporates and extends the notion of publicly verified chained signature (G. Karjoth, et al., 1998) by using a list of route information and a trusted third party to generate a one time public/private key pair.