The Protection Methods for Mobile Code Based on Homomorphic Encryption and Data Confusion

The research for homomorphic encryption and calculation of the encryption function based on homomorphic encryption is still in its infancy, and encryption functions has been limited to the rational polynomial function in the existing program, with polynomial framework message of encrypted functions still being plaintext. This paper proposes a calculating method of homomorphic encryption function for the program logic of mobile code and critical data carried, by using the homomorphic encryption to coefficient and the power homomorphic encryption to index, and adding a function item with the coefficient key zero to hide the skeleton information of polynomial better. The encryption functions computation based on homomorphic encryption and hiding method for data proposed in the paper, have properly solved protection of the program logic of mobile code and carried data. Encryption functions based on homomorphic encryption and data hiding can directly operate cipher text operation, with operation results being automatically encrypted. A further analysis shows that using the proposed method can accomplish non-interactive encrypted computation of elementary functions and provide a new method for the protection of mobile code.

[1]  Liang Chen,et al.  Public Key Homomorphism Based on Modified ElGamal in Real Domain , 2008, 2008 International Conference on Computer Science and Software Engineering.

[2]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[3]  Jim Alves-Foss,et al.  The use of encrypted functions for mobile agent security , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[4]  Clark Thomborson,et al.  A PROVABLE SCHEME FOR HOMOMORPHIC OBFUSCATIONS IN SOFTWARE SECURITY , 2005 .

[5]  Cheng Xin-meng,et al.  A method of homomorphic encryption , 2008, Wuhan University Journal of Natural Sciences.

[6]  Christian F. Tschudin,et al.  Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[7]  Peter Landrock New PKI Protocols Using Tamper Resistant Hardware , 2008, EuroPKI.

[8]  Joos Vandewalle,et al.  (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions , 2003, TOIT.