• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ye Jianwei, Zhang Hongli, Zhang Yongzheng. A Secure Mobile Code Protocol Based on Committed Garbled Circuit[J]. Journal of Computer Research and Development, 2011, 48(5): 862-868.
Citation: Ye Jianwei, Zhang Hongli, Zhang Yongzheng. A Secure Mobile Code Protocol Based on Committed Garbled Circuit[J]. Journal of Computer Research and Development, 2011, 48(5): 862-868.

A Secure Mobile Code Protocol Based on Committed Garbled Circuit

More Information
  • Published Date: May 14, 2011
  • The lack of protections hinders the application of mobile code, and no sound solutions have been proposed for it so far. Garbled circuit is the only pure software protecting technique that is universal and has provable security, by now. The existing CCKM, ACCK, Tate-Xu and Zhong-Yang protocols based on garbled circuit cannot prevent the attacks from malicious participants and cannot fit to mobile code non-interactively. Based on the committed garbled circuit technology of Jarecki et al. and Pedersens verifiable threshold secret sharing scheme, this paper presents a new secure mobile code protocol against the malicious participants. In the new protocol, a group of third-party servers are employed to “challenge” the provers, and to share secrets in every secret sharing scheme. When more than two-thirds of the servers are honest, the new protocol: 1) protects the inputs and outputs of the mobile codes simultaneously and offers more protection than existing protocols; 2) suits for mobile code application non-interactive; 3) makes the executors be able to verify the garbled circuit non-interactively and thus protect themselves from malicious codes; and 4) guarantees that the generators and executors can get correct outputs full fairly.
  • Related Articles

    [1]Lin Jingjing, Ye Zhonglin, Zhao Haixing, Li Zhuoran. Survey on Hypergraph Neural Networks[J]. Journal of Computer Research and Development, 2024, 61(2): 362-384. DOI: 10.7544/issn1000-1239.202220483
    [2]Li Han, Yan Mingyu, Lü Zhengyang, Li Wenming, Ye Xiaochun, Fan Dongrui, Tang Zhimin. Survey on Graph Neural Network Acceleration Architectures[J]. Journal of Computer Research and Development, 2021, 58(6): 1204-1229. DOI: 10.7544/issn1000-1239.2021.20210166
    [3]Fang Rongqiang, Wang Jing, Yao Zhicheng, Liu Chang, Zhang Weigong. Modeling Computational Feature of Multi-Layer Neural Network[J]. Journal of Computer Research and Development, 2019, 56(6): 1170-1181. DOI: 10.7544/issn1000-1239.2019.20190111
    [4]Wang Yilei, Zhuo Yifan, Wu Yingjie, Chen Mingqin. Question Answering Algorithm on Image Fragmentation Information Based on Deep Neural Network[J]. Journal of Computer Research and Development, 2018, 55(12): 2600-2610. DOI: 10.7544/issn1000-1239.2018.20180606
    [5]Huang Liang, Feng Dengguo, Lian Yifeng, Chen Kai. Artificial-Neural-Network-Based DDoS Defense Effectiveness Evaluation[J]. Journal of Computer Research and Development, 2013, 50(10): 2100-2108.
    [6]He Jialang, Zhang Hong. Application of Artificial Neural Network in Software Multi-Faults Location[J]. Journal of Computer Research and Development, 2013, 50(3): 619-625.
    [7]Yang Bo, Wang Yadong, Su Xiaohong, and Tang Xianglong. Neural Networks' Distributed Cooperative Learning Strategy Based on Agent and Chips[J]. Journal of Computer Research and Development, 2006, 43(12): 2096-2103.
    [8]Su Xiaohong, Zhang Mingjie, Ma Peijun, and Wang Yadong. Research on Solving the Problem of CMAC Neural Network Collision[J]. Journal of Computer Research and Development, 2006, 43(5): 862-866.
    [9]Li Aijun, Luo Siwei, Huang Hua, Liu Yunhui. Decision Tree Based Neural Network Design[J]. Journal of Computer Research and Development, 2005, 42(8): 1312-1317.
    [10]Huang Hua, Luo Siwei, Liu Yunhui, and Li Aijun. Knowledge Increase Ability of Artificial Neural Network[J]. Journal of Computer Research and Development, 2005, 42(2): 224-229.

Catalog

    Article views (636) PDF downloads (426) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return