MOBILE AGENT SECURITY WITH EFFICIENT OBLIVIOUS TRANSFER

Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji

2007

Abstract

Cachin et al. and Algesheimer et al. proposed schemes using secure function evaluation for protecting mobile agents in untrusted environments. One of essential ingredients of their protocols is oblivious transfer (although not all of them require it). Unfortunately, naive application of oblivious transfer is inefficient because it must be performed for each bit of encrypted circuit inputs. Therefore, in this paper we propose secure mobile agent protocols with emphasis on efficient oblivious transfer suitable for secure function evaluation.

Download


Paper Citation


in Harvard Style

Hasegawa W., Soshi M. and Miyaji A. (2007). MOBILE AGENT SECURITY WITH EFFICIENT OBLIVIOUS TRANSFER . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 299-304. DOI: 10.5220/0002129002990304

in Bibtex Style

@conference{secrypt07,
author={Wataru Hasegawa and Masakazu Soshi and Atsuko Miyaji},
title={MOBILE AGENT SECURITY WITH EFFICIENT OBLIVIOUS TRANSFER},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={299-304},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002129002990304},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - MOBILE AGENT SECURITY WITH EFFICIENT OBLIVIOUS TRANSFER
SN - 978-989-8111-12-8
AU - Hasegawa W.
AU - Soshi M.
AU - Miyaji A.
PY - 2007
SP - 299
EP - 304
DO - 10.5220/0002129002990304