Preview

Modeling and Analysis of Information Systems

Advanced search

Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator

https://doi.org/10.18255/1818-1015-2014-2-5-14

Abstract

The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t)-threshold proxy signature scheme with an arbitrator. The unique feature of the suggested method is in the absence of necessity to install anti-virus software in a mobile device. It will be enough only to have the software verifying digital signatures and the Internet. The method is used on the base of public keys infrastructure /PKI/, thus minimizing implementation expenses.

About the Author

E. A. Tolyupa
P.G. Demidov Yaroslavl State University
Russian Federation

аспирант,

Sovetskaya str., 14, Yaroslavl, 150000, Russia



References

1. http://letitbit.org/terms/

2. Mambo M., Usuda K., Okamoto E. Proxy signatures: Delegation of the power to sign messages // IEICE Trans. Fundamentals. 1996. V. E79-A. No. 9. P. 1338–1353.

3. Mambo M., Usuda K., Okamoto E. Proxy signatures for delegating signing operation // Proc. of 3rd ACM Conference on Computer and Communications Security (CCS’96). ACM Press, 1996. P. 48–57.

4. Kim S., Park S., Won D. Proxy signatures, revisited // Information and Communications Security (ICICS’97). LNCS 1334. Springer-Verlag, 1997. P. 223–232.

5. Lee B., Kim H., Kim K. Strong proxy signature and its applications // Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS’01), Vol. 2/2. Oiso, Japan, Jan. 23–26, 2001. P. 603–608.

6. Толюпа Е.А. Алгоритм (n, t)-пороговой доверенной цифровой подписи с Арбитром // Моделирование и анализ информационных систем. 2013. Т. 20, №4. C. 55–70. [Tolyupa E.A. An Algorithm of (n; t)-Threshold Proxy Signature with an Arbitrator // Modeling and analysis of information systems. 2013. V. 20, No 4. P. 55–70 (in Russian)].

7. Kaufman C., Perlman R., Speciner M. Network Security: Private Communication in a Public World. Prentice-Hall PTR, 2002.

8. Горбатов В. С , Полянская О. Ю. Основы технологии PKI. М.: Горячая линия — Телеком, 2004. [Gorbatov V. S , Polyanskaya O. Yu. Osnovy tekhnologii PKI. M.: Goryachaya liniya — Telekom, 2004 (in Russian)].

9. Cooper M., Dzambasow Y., Hesse P., Joseph S., Nicholas R. Internet X.509 Public Key Infrastructure: Certification Path Building, RFC 4158, September 2005.

10. Федеральный закон об электронной подписи № 169-ФЗ от 01.07.2011 [Federalnyy zakon ob elektronnoy podpisi № 169-FZ ot 01.07.2011 (in Russian)].

11. Lee J.-Y., Cheon J.-H., Kim S. An analysis of proxy signatures: Is a secure channel necessary? // LNCS. 2003. V. 2612. P. 68–79.

12. Wang G., Bao F., Zhou J., Deng R. H.. Security Analysis of Some Proxy Signatures // Proc. Information Security and Cryptology – ICISC. 2003. LNCS 2971. Springer-Verlag, 2004. P. 305–319.

13. Алферов А.П., Зубов А.Ю., Кузьмин А.С., Черемушкин А.В. Основы криптографии. М.: Гелиос АРВ, 2002. [Alferov A.P., Zubov A.Yu., Kuzmin A.S., Cheremushkin A.V. Osnovy kriptografii. M.: Gelios ARV, 2002 (in Russian)].


Review

For citations:


Tolyupa E.A. Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator. Modeling and Analysis of Information Systems. 2014;21(2):5-14. (In Russ.) https://doi.org/10.18255/1818-1015-2014-2-5-14

Views: 859


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1818-1015 (Print)
ISSN 2313-5417 (Online)