Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Encrypted function
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
An '''encrypted function''' is an attempt to provide [[mobile code]] privacy without providing any [[tamper-resistance|tamper-resistant]] hardware. It is a method where in mobile code can carry out [[cryptography|cryptographic]] primitives. [[polynomial function|Polynomial]] and [[rational function]]s are [[encrypted]] such that their transformation can again be implemented, as programs consisting of [[cleartext]] instructions that a [[central processing unit|processor]] or [[interpreter (computing)|interpreter]] understands. The processor would not understand the program's function. This field of study is gaining popularity as mobile cryptography. ==Example== Scenario: Host A, has an [[algorithm]] which computes function f. A wants to send its [[mobile agent]] to B which holds input x, to compute f(x). But A doesn't want B to learn anything about f. Scheme: Function f is encrypted in a way that results in E(f). Host A then creates another program P(E(f)), which implements E(f), and sends it to B through its agent. B then runs the agent, which computes P(E(f))(x) and returns the result to A. A then decrypts this to get f(x). Drawbacks: Finding appropriate encryption schemes that can transform arbitrary functions is a challenge. The scheme doesn't prevent [[denial of service]], replay, [[experimental extraction]] and others. == See also == * [[Homomorphic encryption]] ==References== * Thomas Sander and Christian F. Tschudin. ''Protecting Mobile Agents Against Malicious Hosts.'' In G. Vigna, editor, Mobile agents and security, volume 1419 of Lecture Notes in Computer Science, pages 44β60. Springer-Verlag, New York, NY, 1998. [http://citeseer.ist.psu.edu/cache/papers/cs/16015/http:zSzzSzwww.icsi.berkeley.eduzSz~tschudinzSzpszSzma-security.pdf/sander98protecting.pdf] [[Category:Cryptography]] {{comp-sci-stub}}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Comp-sci-stub
(
edit
)