高级检索
    叶建伟, 张宏莉, 张永铮. 一种基于带承诺加密电路的移动代码保护协议[J]. 计算机研究与发展, 2011, 48(5): 862-868.
    引用本文: 叶建伟, 张宏莉, 张永铮. 一种基于带承诺加密电路的移动代码保护协议[J]. 计算机研究与发展, 2011, 48(5): 862-868.
    Ye Jianwei, Zhang Hongli, Zhang Yongzheng. A Secure Mobile Code Protocol Based on Committed Garbled Circuit[J]. Journal of Computer Research and Development, 2011, 48(5): 862-868.
    Citation: Ye Jianwei, Zhang Hongli, Zhang Yongzheng. A Secure Mobile Code Protocol Based on Committed Garbled Circuit[J]. Journal of Computer Research and Development, 2011, 48(5): 862-868.

    一种基于带承诺加密电路的移动代码保护协议

    A Secure Mobile Code Protocol Based on Committed Garbled Circuit

    • 摘要: 基于Jarecki和Shmatikov的带承诺加密电路技术和Pedersen的可验证门限秘密共享方案,提出了一种新的适用于恶意环境的移动代码保护协议.新协议使用一组服务器来代理部分零知识证明过程并共享密钥.当诚实的服务器多于2/3时,新协议:1)能同时保护输入输出的安全,较现有协议有更高安全性;2)适用于无交互的移动代码环境;3)使得发起者无需和执行者交互就能验证移动代码的正确性,从而避免恶意发起者使用恶意代码来破坏执行者的安全性;4)使得发起者和执行者能公平地得到正确的输出.

       

      Abstract: The lack of protections hinders the application of mobile code, and no sound solutions have been proposed for it so far. Garbled circuit is the only pure software protecting technique that is universal and has provable security, by now. The existing CCKM, ACCK, Tate-Xu and Zhong-Yang protocols based on garbled circuit cannot prevent the attacks from malicious participants and cannot fit to mobile code non-interactively. Based on the committed garbled circuit technology of Jarecki et al. and Pedersens verifiable threshold secret sharing scheme, this paper presents a new secure mobile code protocol against the malicious participants. In the new protocol, a group of third-party servers are employed to “challenge” the provers, and to share secrets in every secret sharing scheme. When more than two-thirds of the servers are honest, the new protocol: 1) protects the inputs and outputs of the mobile codes simultaneously and offers more protection than existing protocols; 2) suits for mobile code application non-interactive; 3) makes the executors be able to verify the garbled circuit non-interactively and thus protect themselves from malicious codes; and 4) guarantees that the generators and executors can get correct outputs full fairly.

       

    /

    返回文章
    返回