Many (proxy) automatic signature schemes are proposed to guard against the (unknown) virus infection with the help of honest compiler makers. In these proposed schemes, the used compiler agents’ public keys should be certificated and maintained by verifiers. If verifiers only keep the compiler makers’ public key, it is more convenient. So an anonymous proxy automatic signature scheme with compiler agents is proposed. In the new scheme, the compiler agents are anonymous and verifiers do not need to store compiler agents’ public key. Moreover, verifiers can authenticate the source of received executable problems and detect compiler agents’ deviation in advance. Our schemes are suitable for adopting any discrete logarithm based signature schemes. Our scheme has provides strong moderator’s judgment to detect of virus infection sources.
[1] Okamoto, E., “Integrated Security System and its Application to Anti-viral Methods,” Proc. 6th Virus and Security Conf (1993).
[2] Hedberg, S., “Combating Computer Viruses: IBM’s New Computer Immune System,” Parallel & Distributed Technology: Systems & Applications, IEEE, Vol. 4, pp. 911 (1996).
[3] Nachenberg, C., “Computer Virus-antivirus Coevolution,” Communications of the ACM, Vol. 40, pp. 46 51 (1997).
[4] Subramanya, S. R. and Lakshminarasimhan, N., “Computer Viruses,” Potentials, IEEE, Vol. 20, pp. 1619 (2001).
[5] Usuda, K., Mambo, M., Uyematsu, T. and Okamoto, E., “Proposal of an Automatic Signature Scheme Using a Compiler,” IEICE Transactions Fundamentals, Vol. E79-A, pp .94101 (1996).
[6] Lin, W.-D. and Jan, J.-K., “An Automatic Signature Scheme Using a Compiler in Distributed Systems,” IEICE Transactions on Communications, Vol. E83-B pp. 935941 (2000).
[7] Tseng, Y.-M., “Cryptanalysis and Restriction of an Automatic Signature Scheme in Distributed Systems,” IEICE Transactions on Communications, Vol. E86-B pp. 16791681 (2000).
[8] Hwang, S.-J. and Li, E.-T., “A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems,” 2004 Information Security Conference, Taipei, Taiwan, R.O.C., pp. 345352 (2004).
[9] Hawng, S.-J. and Chen, K.-H., “A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection,” Advanced Information Networking and Applications 2005, Taiwan, R.O.C., pp. 649654 (2005).
[11] ElGamal, T., “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithm,” IEEE Transactions on Information Theory, Vol. 31, pp. 4691985 (1985).
[12] FIPS PUB 186, February 1991, Digital signature Standard.
We use cookies on this website to personalize content to improve your user experience and analyze our traffic. By using this site you agree to its use of cookies.