Environmental Key Generation towards Clueless Agents. James Riordan School of Mathematics University of Minnesota. Bruce Schneier Counterpane Systems. Published: Mobile Agents and Security, G. Vigna, ed., Springer-Verlag, 1998, pp. 15-24
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
School of Mathematics University of Minnesota.
Mobile Agents and Security, G. Vigna, ed., Springer-Verlag, 1998, pp. 15-24
Presented by Chinchi,Lo
Keying material that is constructed from certain classes of environmental data.
Without the environmentally supplied input, the agent cannot decrypt its own message.
These protocols have three distinct stages:
For each time , the server has a method of generating a public/secret key pair . The server can either store these key pairs, or regenerate them as required.
The programmer sends the server a program P and the hash of a particular possible output of the program P.
The server returns and .
The programmer sets and uses it to encrypt the message to the agent. The programmer then gives to the agent.
The agent gives to the server.
The server decrypts the program , executes it, and setsM = H(P’s output). It then return H(S,P,M) to the agent.
The agent tries to use the returned value as it key. It will succeed precisely when the output of the run program matches the programmer’s expectations.General Server Constructions