MOBILE AGENT SECURITY WITH EFFICIENT OBLIVIOUS TRANSFER

Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji

Abstract

Cachin et al. and Algesheimer et al. proposed schemes using secure function evaluation for protecting mobile agents in untrusted environments. One of essential ingredients of their protocols is oblivious transfer (although not all of them require it). Unfortunately, naive application of oblivious transfer is inefficient because it must be performed for each bit of encrypted circuit inputs. Therefore, in this paper we propose secure mobile agent protocols with emphasis on efficient oblivious transfer suitable for secure function evaluation.

References

  1. Algesheimer, J., Cachin, C., Camenisch, J., and Karjoth, G. (2001). Cryptographic security for mobile code. In Proc. IEEE Symp. Security and Privacy, pages 2-11.
  2. Cachin, C., Camenisch, J., Kilian, J., and Müller, J. (2000). One-round secure computation and secure autonomous mobile agents. In Proc. ICALP, vol. 1853 of LNCS, pages 512-523. Springer-Verlag.
  3. Chu, C.-K. and Tzeng, W.-G. (2005). Efficient k-out-ofn oblivious transfer schemes with adaptive and nonadaptive queries. In PKC 2005, vol. 3386 of LNCS, pages 172-183. Springer-Verlag.
  4. Hasegawa, W., Soshi, M., and Miyaji, A. (2007). Efficient communication on mobile agent security. In Symposium on Cryptography and Information Security (SCIS2007), 4F1-5.
  5. Mori, M., Soshi, M., and Miyaji, A. (2005). Consideration for mobile agent security. IPSJ SIG Technical Reports 2005-CSEC-28. pp. 123-128.
  6. Naor, M. and Pinkas, B. (1999). Oblivious transfer and polynomial evaluation. In Proc. STOC 7899, pages 245-254.
  7. Rothermel, K. and Popescu-Zeletin, R., editors (1997). Mobile Agents: First International Workshop (MA 7897), vol. 1219 of LNCS. Springer-Verlag.
  8. Yao, A. C. (1986). How to generate and exchange secrets. In Proc. FOCS, pages 162-167.
Download


Paper Citation


in Harvard Style

Hasegawa W., Soshi M. and Miyaji A. (2007). MOBILE AGENT SECURITY WITH EFFICIENT OBLIVIOUS TRANSFER . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 299-304. DOI: 10.5220/0002129002990304


in Bibtex Style

@conference{secrypt07,
author={Wataru Hasegawa and Masakazu Soshi and Atsuko Miyaji},
title={MOBILE AGENT SECURITY WITH EFFICIENT OBLIVIOUS TRANSFER},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={299-304},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002129002990304},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - MOBILE AGENT SECURITY WITH EFFICIENT OBLIVIOUS TRANSFER
SN - 978-989-8111-12-8
AU - Hasegawa W.
AU - Soshi M.
AU - Miyaji A.
PY - 2007
SP - 299
EP - 304
DO - 10.5220/0002129002990304