Skip to main content

Policy-Based Authentication for Mobile Agents

  • Conference paper
Information Security Practice and Experience (ISPEC 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6672))

  • 1034 Accesses

Abstract

Mobile agents have exhibited many useful applications in e-commerce. Security is critical to ensure a success of mobile agent applications. There exist several solutions for mobile agent security. Amongst these solutions, the proxy-based model is believed to be a sound solution to provide authentication, where the visiting host of an agent acts as a proxy signer who can sign an offer. However, any host (including a malicious host) could act as the signer. To solve this problem, a secure policy-based mobile agent scheme is proposed in this paper. That is, only the hosts who satisfy the designated policies can generate a valid signature. We also provide a security model and a rigorous security proof for our proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code. In: 2001 IEEE Symposium on Security and Privacy, pp. 2–11 (2001)

    Google Scholar 

  2. Bagga, W., Molva, R.: Policy-based cryptography and applications. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 72–87. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Bagga, W., Molva, R.: Collusion-free policy-based encryption. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 233–245. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. Journal of Cryptology 17(4), 297–319 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  5. Chess, D.M.: Security issues in mobile code systems. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 1–14. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  6. Hohl, F.: Time limited blackbox security: Protecting mobile agents from malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  7. Kim, H., Baek, J., Lee, B., Kim, K.: Secret computation with secrets for mobile agent using on-time proxy signature. In: The 2001 Symposium on Cryptography and Information Security (SCIS) (January 2001)

    Google Scholar 

  8. Kim, S., Chung, I.: A secure mobile agent system applying identity-based digital signature scheme. In: Shafazand, H., Tjoa, A.M. (eds.) EurAsia-ICT 2002. LNCS, vol. 2510, pp. 588–596. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Kotzanikolaou, P., Burmester, M., Chrissikopoulos, V.: Secure transactions with mobile agents in hostile environments. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 289–297. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  10. Lee, B., Kim, H., Kim, K.: Secure mobile agent using strong non-designated proxy signature. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 474–486. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  11. Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: The 2001 Symposium on Cryptography and Information Security (SCIS), pp. 603–608 (January 2003)

    Google Scholar 

  12. Lee, Y., Kim, H., Park, Y., Yoon, H.: A new proxy signature scheme providing self-delegation. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 328–342. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Lin, C.Y., Wu, T.C.: An identity-based ring signature scheme from bilinear pairings. In: The 18th International Conference on Advanced Information Networking and Applications, vol. 5927. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  14. Park, H.U., Lee, I.Y.: A digital nominative proxy signature scheme for mobile communication. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 451–455. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  15. Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  16. Seo, S.H., Lee, S.H.: A secure mobile agent system using multi-signature scheme in electronic commerce. In: Chung, C.-W., Kim, C.-k., Li, X.-L., Ling, T.-W., Song, K.-H. (eds.) HSI 2003. LNCS, vol. 2713, pp. 527–536. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. Thorncharoensri, P., Susilo, W., Mu, Y.: Policy-controlled signatures. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. LNCS, vol. 5927, pp. 91–106. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  18. Thorncharoensri, P., Susilo, W., Mu, Y.: Policy-controlled signatures and their applications. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. LNCS, vol. 5927, pp. 91–106. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  19. Zhang, F., Kim, K.: ID-based blind signature and ring signature from pairings. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 533–547. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  20. Zhang, Q., Mu, Y., Zhang, M.: Secure mobile agent with designated hosts. In: 2009 Third International Conference on Network and System Security, pp. 286–293 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, Y., Mu, Y., Zhang, M. (2011). Policy-Based Authentication for Mobile Agents. In: Bao, F., Weng, J. (eds) Information Security Practice and Experience. ISPEC 2011. Lecture Notes in Computer Science, vol 6672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21031-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21031-0_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21030-3

  • Online ISBN: 978-3-642-21031-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics