Abstract
A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, we consider a framework for the prevention of agent tampering without compromising the mobility or autonomy of the agent. Our approach uses encrypted functions. We present an RSA implementation which answers affirmatively the open problem on undetachable signatures of Sander and Tschudin.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chess, D., Harrison, C., Kershenbaum, A.: Mobile Agents: Are They a Good Idea? In: Vitek, J., Tschudin, C. (eds.) Mobile Object Systems. Springer, Heidelberg (1996)
Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant Agents for Mobile Computing, Technical Report, RC 20010, IBM T.J. Watson Research Center, NY (1995)
Chess, D.M.: Security Issues in Mobile Code Systems. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 1–14. Springer, Heidelberg (1998)
Don, C., Jacques, S., Serge, V.: Attacks on the Birational Permutation Signature Schemes. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 435–443. Springer, Heidelberg (1994)
William, F., Joshua, G., Vipin, S.: Security for Mobile Agents: Authentication and State Appraisal. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 118–130. Springer, Heidelberg (1996)
Fritz, H.: Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)
Hohl, F.: A Model of Attacks of Malicious Hosts Against Mobile Agents. In: Proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, INRIA, France, pp. 105 - 120 (1998)
Markus, J., Ari, J.: X-cash: Executable Digital Cash. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 16–27. Springer, Heidelberg (1998)
Panayiotis, K., George, K., Vassilios, C.: Mobile Agents for Secure Electronic Transactions. In: Recent Advances in Signal Processing and Communications, pp. 363–368. World Scientific and Engineering Society Press, Singapore (1999)
Richard, L., Tomas, S.: An Additively Homomorphic Encryption Scheme or How to Introduce a Partial Trapdoor in the Discrete Log ( November 1997) (submitted for Publication)
Sergio, L., Refik, M.: Privacy for Mobile Code. In: proceedings of Distributed Object Security Workshop OOPSLA 1999, Denver (November 1999)
Merwe, J., Solms, S.H.: Electronic Commerce with Secure Intelligent Trade Agents. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 452–462. Springer, Heidelberg (1997)
Palmer, E.: An Introduction to Citadel – a Secure Crypto Coprocessor for Workstations. In: Proceedings of the IFIP SEC 1994 Conference, Curacao (1994)
Ronald, R., Adi, S., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of ACM 21(2), 120–126 (1978)
Tomas, S., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)
Adi, S.: Efficient Signature Schemes Based On Birational Premutations. In: Proceedings of the DARPA Workshop on foundations for secure mobile code, Monterey CA, USA (1997)
Giovanni, V.: Cryptographic Traces for Mobile Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 137–153. Springer, Heidelberg (1998)
Wilhelm, U.G.: Cryptographically Protected Objects. Technical Report, Ecole Polytechnique Federale de Lausanne, Switzerland (1997)
Yee Bennet, S.: A Sanctuary for Mobile Agents. In: Proceedings of the DARPA workshop on foundations for secure mobile code, Monterey CA, USA (1997)
Xun, Y., Feng, W.X., Yan, L.K.: A Secure Intelligent Trade Agent System. In: Lamersdorf, W., Merz, M. (eds.) TREC 1998. LNCS, vol. 1402, pp. 218–228. Springer, Heidelberg (1998)
Michael, Z., Helge, M., Kurt, G.: Security Requirements for Mobile Agents in Electronic Markets. In: Lamersdorf, W., Merz, M. (eds.) TREC 1998. LNCS, vol. 1402, pp. 205–217. Springer, Heidelberg (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kotzanikolaou, P., Burmester, M., Chrissikopoulos, V. (2000). Secure Transactions with Mobile Agents in Hostile Environments. In: Dawson, E.P., Clark, A., Boyd, C. (eds) Information Security and Privacy. ACISP 2000. Lecture Notes in Computer Science, vol 1841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10718964_24
Download citation
DOI: https://doi.org/10.1007/10718964_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67742-0
Online ISBN: 978-3-540-45030-6
eBook Packages: Springer Book Archive