Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2015, Article ID 901418, 12 pages
http://dx.doi.org/10.1155/2015/901418
Research Article

Secure Mobile Agent from Leakage-Resilient Proxy Signatures

Fei Tang,1,2 Hongda Li,1,2 Qihua Niu,1,2 and Bei Liang1,2

1The Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, No. 89 Minzhuang Road, Haidian District, Beijing 100093, China
2State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, No. 89 Minzhuang Road, Haidian District, Beijing 100093, China

Received 27 February 2014; Accepted 3 March 2014

Academic Editor: David Taniar

Copyright © 2015 Fei Tang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. W. Farmer, J. Gutmann, and V. Swarup, “Security for mobile agents: authentication and state appraisal,” in Computer Security—ESORICS 96: 4th European Symposium on Research in Computer Security Rome, Italy, September 25-27, 1996 Proceedings, vol. 1146 of Lecture Notes in Computer Science, pp. 118–130, Springer, Berlin, Germany, 1996. View at Publisher · View at Google Scholar
  2. P. Kotzanikolaous, G. Katsirelos, and V. Chrissikopoulos, “Mobile agents for secure electronic transactions,” in Recent Advances in Signal Processing and Communications, pp. 363–368, World Scientific and Engineering Society Press, 1999. View at Google Scholar
  3. B. Lee, H. Kim, and K. Kim, “Secure mobile agent using strong non-designated proxy signature,” in Information Security and Privacy: Proceedings of the 6th Australasian Conference (ACISP '01), Sydney, Australia, July 11–13, 2001, vol. 2119 of Lecture Notes in Computer Science, pp. 474–486, Springer, Berlin, Germany, 2001. View at Publisher · View at Google Scholar
  4. B. Lee, H. Kim, and K. Kim, “Strong proxy signature and its applications,” in Proceedings of the Symposium on Cryptography and Information Security (SCIS '01), pp. 603–608, 2001.
  5. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures: delegation of the power to sign messages,” IEICE Transactions on Fundamentals of Electronics, vol. 79, pp. 1338–1353, 1996. View at Google Scholar
  6. G. Allée, S. Pierre, R. H. Glitho, and A. El Rhazi, “An improved itinerary recording protocol for securing distributed architectures based on mobile agents,” Mobile Information Systems, vol. 1, no. 2, pp. 129–147, 2005. View at Publisher · View at Google Scholar
  7. R. Aversa, B. Di Martino, N. Mazzocca, and S. Venticinque, “A skeleton based programming paradigm for mobile multi-agents on distributed systems and its realization within the MAGDA mobile agents platform,” Mobile Information Systems, vol. 4, no. 2, pp. 131–146, 2008. View at Publisher · View at Google Scholar
  8. K. Goto, Y. Sasaki, T. Hara, and S. Nishio, “Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks,” Mobile Information Systems, vol. 9, no. 4, pp. 295–314, 2013. View at Publisher · View at Google Scholar
  9. Y. Wang, D. S. Wong, and H. Wang, “Employ a mobile agent for making a payment,” in Mobile Information Systems, vol. 4, pp. 51–68, IOS Press, 2008. View at Publisher · View at Google Scholar
  10. S. Parvin, F. K. Hussain, and S. Ali, “A methodology to counter DoS attacks in mobile IP communication,” Mobile Information Systems, vol. 8, no. 2, pp. 127–152, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. H. U. Park and I. Y. Lee, “A digital nominative proxy signature scheme for mobile communication,” in Information and Communications Security: Third International Conference, ICICS 2001 Xian, China, November 13–16, 2001 Proceedings, vol. 2229 of Lecture Notes in Computer Science, pp. 451–455, Springer, Berlin, Germany, 2001. View at Publisher · View at Google Scholar
  12. S. Kim, S. Park, and D. Won, “Proxy signatures, revisited,” in Proceedings of the 1st International Conference on Information and Communication Security (ICICS '97), vol. 1334 of Lecture Notes in Computer Science, pp. 223–232, Springer, 1997. View at Google Scholar
  13. A. Boldyreva, A. Palacio, and B. Warinschi, “Secure proxy signature schemes for delegation of signing rights,” Journal of Cryptology, vol. 25, no. 1, pp. 57–115, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. T. Malkin, S. Obana, and M. Yung, “The hierarchy of key evolving signatures and a characterization of proxy signatures,” in Advances in Cryptology—EUROCRYPT 2004, vol. 3027 of Lecture Notes in Computer Science, pp. 306–322, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar · View at MathSciNet
  15. J. C. N. Schuldt, K. Matsuura, and K. G. Paterson, “Proxy signature secure against key exposure,” in Public Key Cryptography—PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, vol. 4939 of Lecture Notes in Computer Science, pp. 141–161, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  16. H. Wang and J. Pieprzyk, “Efficient one-time proxy signatures,” in Advances in Cryptology—ASIACRYPT 2003, vol. 2894 of Lecture Notes in Computer Science, pp. 507–522, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar
  17. F. Zhang, R. Safavi-Naini, and C. Y. Lin, “New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings,” Tech. Rep. 2003/104, Cryptology ePrint Archive, 2003, http://eprint.iacr.org/. View at Google Scholar
  18. S. Goldwasser and S. Micali, “Probabilistic encryption,” Journal of Computer and System Sciences, vol. 28, no. 2, pp. 270–299, 1984. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  19. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures for delegating signing operation,” in Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCS '96), pp. 48–56, ACM, March 1996. View at Scopus
  20. J. Y. Lee, J. H. Cheon, and S. Kim, “An analysis of proxy signatures: is a secure channel necessary?” in Proceedings of the Cryptographers' Track at the RSA Conference, San Francisco, Calif, USA, April 2003, Lecture Notes in Computer Science, pp. 68–79, Springer, 2003. View at Google Scholar
  21. Y. Dodis, J. Katz, S. Xu, and M. Yung, “Strong key-insulated signature schemes,” in Public Key Cryptography—PKC 2003, vol. 2567 of Lecture Notes in Computer Science, pp. 130–144, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar · View at MathSciNet
  22. D. Brumley and D. Boneh, “Remote timing attacks are practical,” Computer Networks, vol. 48, no. 5, pp. 701–716, 2005. View at Publisher · View at Google Scholar · View at Scopus
  23. P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” in Advances in Cryptology—CRYPTO'99, vol. 1666 of Lecture Notes in Computer Science, pp. 388–397, Springer, Berlin, Germany, 1999. View at Publisher · View at Google Scholar
  24. E. Biham, Y. Carmeli, and A. Shamir, “Bug attacks,” in Advances in Cryptology—CRYPTO 2008, vol. 5157 of Lecture Notes in Computer Science, pp. 221–240, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  25. D. Boneh, R. A. DeMillo, and R. J. Lipton, “On the importance of checking cryptographic protocols for faults,” in Advances in Cryptology—EUROCRYPT'97, vol. 1233 of Lecture Notes in Computer Science, pp. 37–51, Springer, Berlin, Germany, 1997. View at Publisher · View at Google Scholar · View at MathSciNet
  26. S. Micali and L. Reyzin, “Physically observable cryptography,” in Theory of Cryptography: Proceedings of the 1st Theory of Cryptography Conference (TCC '04), Cambridge, MA, USA, February 19—21, 2004, vol. 2951 of Lecture Notes in Computer Science, pp. 278–296, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar
  27. Z. Brakerski, Y. T. Kalai, J. Katz, and V. Vaikuntanathan, “Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage,” in Proceedings of the IEEE 51st Annual Symposium on Foundations of Computer Science (FOCS '10), pp. 501–510, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  28. Y. Dodis, K. Haralambiev, A. Lopez-Alt, and D. Wichs, “Cryptography against continuous memory attacks,” in Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science, pp. 511–520, 2010.
  29. K. Pietrzak, “A leakage-resilient mode of operation,” in Advances in Cryptology—EUROCRYPT '09, vol. 5479 of Lecture Notes in Computer Science, pp. 462–482, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar · View at MathSciNet
  30. S. Garg, A. Jain, and A. Sahai, “Leakage-resilient zero knowledge,” in Advances in Cryptology—CRYPTO 2011, vol. 6841 of Lecture Notes in Computer Science, pp. 297–315, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  31. E. Kiltz and K. Pietrzak, “Leakage resilient ElGamal encryption,” in Advances in Cryptology—ASIACRYPT '10, vol. 6477 of Lecture Notes in Computer Science, pp. 595–612, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  32. M. Naor and G. Segev, “Public-key cryptosystems resilient to key leakage,” in Advances in Cryptology—CRYPTO 2009, vol. 5677 of Lecture Notes in Computer Science, pp. 18–35, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  33. S. S. M. Chow, Y. Dodis, Y. Rouselakis, and B. Waters, “Practical leakage-resilient identity-based encryption from simple assumptions,” in Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10), pp. 152–161, ACM, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  34. T. H. Yuen, S. S. M. Chow, Y. Zhang, and S. M. Yiu, “Identity-based encryption resilient to continual auxiliary leakage,” in Advances in Cryptology—EUROCRYPT 2012, vol. 7237 of Lecture Notes in Computer Science, pp. 117–134, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar
  35. J. Alwen, Y. Dodis, and D. Wichs, “Leakage-resilient public-key cryptography in the bounded-retrieval model,” in Advances in Cryptology—CRYPTO 2009, vol. 5677 of Lecture Notes in Computer Science, pp. 36–54, Springer, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  36. E. Boyle, G. Segev, and D. Wichs, “Fully leakage-resilient signatures,” in Advances in Cryptology—EUROCRYPT 2011, vol. 6632 of Lecture Notes in Computer Science, pp. 89–108, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  37. S. Faust, E. Kiltz, K. Pietrzak, and G. N. Rothblum, “Leakage-resilient signatures,” in Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings, vol. 5978 of Lecture Notes in Computer Science, pp. 343–360, Springer, Berlin, Germany, 2010. View at Google Scholar
  38. J. Katz and V. Vaikuntanathan, “Signature schemes with bounded leakage resilience,” in Advances in Cryptology—ASIACRYPT 2009, vol. 5912 of Lecture Notes in Computer Science, pp. 703–720, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  39. T. Malkin, I. Teranishi, Y. Vahlis, and M. Yung, “Signatures resilient to continual leakage on memory and computation,” in Proceedings of the 8th Theory of Cryptography Conference (TCC '11), vol. 6597 of Lecture Notes in Computer Science, pp. 89–106, Springer, Providence, RI, USA, 2011. View at Publisher · View at Google Scholar
  40. F. Tang, H. Li, Q. Niu, and B. Liang, “Efficient leakage-resilient signature schemes in the generic bilinear group model,” Cryptology ePrint Archive 2013/785, 2013, http://eprint.iacr.org/. View at Google Scholar
  41. D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and verifiably encrypted signatures from bilinear maps,” in Advances in Cryptology—EUROCRYPT 2003, vol. 2656 of Lecture Notes in Computer Science, pp. 416–432, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar · View at MathSciNet
  42. F. Tang, H. Li, Q. Niu, and B. Liang, “Leakage-resilient proxy signatures,” in Proceedings of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS '13), pp. 495–502, Xi'an, China, September 2013. View at Publisher · View at Google Scholar · View at Scopus