Abstract
Mobile agents have exhibited many useful applications in e-commerce. Security is critical to ensure a success of mobile agent applications. There exist several solutions for mobile agent security. Amongst these solutions, the proxy-based model is believed to be a sound solution to provide authentication, where the visiting host of an agent acts as a proxy signer who can sign an offer. However, any host (including a malicious host) could act as the signer. To solve this problem, a secure policy-based mobile agent scheme is proposed in this paper. That is, only the hosts who satisfy the designated policies can generate a valid signature. We also provide a security model and a rigorous security proof for our proposed scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code. In: 2001 IEEE Symposium on Security and Privacy, pp. 2–11 (2001)
Bagga, W., Molva, R.: Policy-based cryptography and applications. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 72–87. Springer, Heidelberg (2005)
Bagga, W., Molva, R.: Collusion-free policy-based encryption. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 233–245. Springer, Heidelberg (2006)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. Journal of Cryptology 17(4), 297–319 (2004)
Chess, D.M.: Security issues in mobile code systems. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 1–14. Springer, Heidelberg (1998)
Hohl, F.: Time limited blackbox security: Protecting mobile agents from malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)
Kim, H., Baek, J., Lee, B., Kim, K.: Secret computation with secrets for mobile agent using on-time proxy signature. In: The 2001 Symposium on Cryptography and Information Security (SCIS) (January 2001)
Kim, S., Chung, I.: A secure mobile agent system applying identity-based digital signature scheme. In: Shafazand, H., Tjoa, A.M. (eds.) EurAsia-ICT 2002. LNCS, vol. 2510, pp. 588–596. Springer, Heidelberg (2002)
Kotzanikolaou, P., Burmester, M., Chrissikopoulos, V.: Secure transactions with mobile agents in hostile environments. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 289–297. Springer, Heidelberg (2000)
Lee, B., Kim, H., Kim, K.: Secure mobile agent using strong non-designated proxy signature. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 474–486. Springer, Heidelberg (2001)
Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: The 2001 Symposium on Cryptography and Information Security (SCIS), pp. 603–608 (January 2003)
Lee, Y., Kim, H., Park, Y., Yoon, H.: A new proxy signature scheme providing self-delegation. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 328–342. Springer, Heidelberg (2006)
Lin, C.Y., Wu, T.C.: An identity-based ring signature scheme from bilinear pairings. In: The 18th International Conference on Advanced Information Networking and Applications, vol. 5927. IEEE Computer Society, Los Alamitos (2004)
Park, H.U., Lee, I.Y.: A digital nominative proxy signature scheme for mobile communication. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 451–455. Springer, Heidelberg (2001)
Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)
Seo, S.H., Lee, S.H.: A secure mobile agent system using multi-signature scheme in electronic commerce. In: Chung, C.-W., Kim, C.-k., Li, X.-L., Ling, T.-W., Song, K.-H. (eds.) HSI 2003. LNCS, vol. 2713, pp. 527–536. Springer, Heidelberg (2003)
Thorncharoensri, P., Susilo, W., Mu, Y.: Policy-controlled signatures. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. LNCS, vol. 5927, pp. 91–106. Springer, Heidelberg (2009)
Thorncharoensri, P., Susilo, W., Mu, Y.: Policy-controlled signatures and their applications. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. LNCS, vol. 5927, pp. 91–106. Springer, Heidelberg (2009)
Zhang, F., Kim, K.: ID-based blind signature and ring signature from pairings. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 533–547. Springer, Heidelberg (2002)
Zhang, Q., Mu, Y., Zhang, M.: Secure mobile agent with designated hosts. In: 2009 Third International Conference on Network and System Security, pp. 286–293 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, Y., Mu, Y., Zhang, M. (2011). Policy-Based Authentication for Mobile Agents. In: Bao, F., Weng, J. (eds) Information Security Practice and Experience. ISPEC 2011. Lecture Notes in Computer Science, vol 6672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21031-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-21031-0_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21030-3
Online ISBN: 978-3-642-21031-0
eBook Packages: Computer ScienceComputer Science (R0)