Secure Computation in Hostile Environments
نویسندگان
چکیده
1 I Side Channel Attacks 3
منابع مشابه
A Tamper-Detecting Implementation of Lisp
An important and recurring security scenario involves the need to carry out trusted computations in the context of untrusted environments. It is shown how a tamper-detecting interpreter for a programming language – specifically Lisp 1.5 – combined with the use of a secure co-processor can address this problem. The term “tamper-detecting” means that any attempt to corrupt a computation carried o...
متن کاملA Diierent Look at Secure Distributed Computation
We discuss various aspects of secure distributed computation and look at weakening both the goals of such computation and the assumed capabilities of adversaries. We present a new protocol for a conditional form of probabilistic coordination and present a model of secure distributed computation in which friendly and hostile nodes are represented in competing interwoven networks of nodes. It is ...
متن کاملSecure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice?
Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice?
متن کاملSecure Transactions with Mobile Agents in Hostile Environments
A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, we consider a framework for the prevention of agent tampering without compromising the mobility or autonomy of the agent. Our approach uses encrypted functions. We present an RSA implementation which answers affirmatively the open problem on undetachable signatures o...
متن کاملSecure data aggregation in wireless sensor networks: A comprehensive overview
Wireless sensor networks often consists of a large number of low-cost sensor nodes that have strictly limited sensing, computation, and communication capabilities. Due to resource restricted sensor nodes, it is important to minimize the amount of data transmission so that the average sensor lifetime and the overall bandwidth utilization are improved. Data aggregation is the process of summarizi...
متن کامل