首页 | 本学科首页   官方微博 | 高级检索  
     

基于加乘同态与组合函数技术的MA保护研究
引用本文:吴杰宏,张坡,石祥滨.基于加乘同态与组合函数技术的MA保护研究[J].小型微型计算机系统,2012(10):2223-2226.
作者姓名:吴杰宏  张坡  石祥滨
作者单位:沈阳航空航天大学工程训练中心;沈阳航空航天大学计算机学院
基金项目:国家自然科学基金项目(61170185)资助;辽宁省科技厅博士启动基金项目(20101082)资助;辽宁省教育厅科学技术基金项目(L2011030)资助
摘    要:针对移动代理在异质网络环境中的安全问题,提出一种基于加乘同态与组合函数加密策略的MA保护方案,同态思想应用于移动密码学中,不用解密即可使加密任务代理在其它网络平台上运行.该方案在同态的基础上引入了加乘同态加密策略,采用了加乘同态加密三地址码操作数,组合函数加密三地址码操作码的加密步骤,并在加密后排除了由加乘同态与组合函数引起的双重加密问题.最后给出了该方案的正确性及安全性验证.实验结果表明:对比同态加密方法,该方案节省执行时间5.12秒,并能及时侦测出恶意主机.

关 键 词:移动代理  加乘同态  组合函数  主动保护  时间核查

Research of MA Protection Based on Addition-multiplication Homomorphism and Composite Function Technology
WU Jie-hong,ZHANG Po,SHI Xiang-bin.Research of MA Protection Based on Addition-multiplication Homomorphism and Composite Function Technology[J].Mini-micro Systems,2012(10):2223-2226.
Authors:WU Jie-hong  ZHANG Po  SHI Xiang-bin
Affiliation:1(Engineering Training Center,Shenyang Aerospace University,Shenyang 110136,China) 2(School of Computer,Shenyang Aerospace University,Shenyang 110136,China)
Abstract:Addition-multiplication homomorphism and composite function encryption protecting scheme is put forward,aiming to solve the security problems of Mobile agents(MA) migrating across heterogeneous network execution environments.Homomorphism idea is applied to mobile cryptography,and encrypted mobile codes can be executed directly on different platforms without decryption.Addition-multiplication homomorphism(AMH) and composite function encryption strategies are introduced here,and encrypting steps are used as follows:first three address operands are encrypted by Addition-multiplication homomorphism method,then three address operating codes are encrypted by composite function method,double encryption problems are considered at last,and eliminating the statements that are encrypted by both AMH and composite function methods.Correctness and security are verified in this scheme.Experimental results show:By contrast to homomorphism encryption method,nearly 5.12s executing time will be saved using this addition-multiplication homomorphism and composite function encryption scheme,and malicious hosts are detected timely.
Keywords:mobile agent  addition-multiplication homomorphism  composite function  active protection  time checking
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号