Journal of Applied Science and Engineering

Published by Tamkang University Press

1.30

Impact Factor

1.60

CiteScore

Shin-Jia Hwang This email address is being protected from spambots. You need JavaScript enabled to view it.1 and Kuang-Hsi Chen1

1Department of Computer Science and Information Engineering, TamKang University, Tamsui, Taiwan 251, R.O.C.


 

Received: January 6, 2006
Accepted: May 17, 2006
Publication Date: March 1, 2007

Download Citation: ||https://doi.org/10.6180/jase.2007.10.1.09  


ABSTRACT


Many (proxy) automatic signature schemes are proposed to guard against the (unknown) virus infection with the help of honest compiler makers. In these proposed schemes, the used compiler agents’ public keys should be certificated and maintained by verifiers. If verifiers only keep the compiler makers’ public key, it is more convenient. So an anonymous proxy automatic signature scheme with compiler agents is proposed. In the new scheme, the compiler agents are anonymous and verifiers do not need to store compiler agents’ public key. Moreover, verifiers can authenticate the source of received executable problems and detect compiler agents’ deviation in advance. Our schemes are suitable for adopting any discrete logarithm based signature schemes. Our scheme has provides strong moderator’s judgment to detect of virus infection sources.


Keywords: : Compilers, Distributed System, Computer Virus, Digital Signature, Proxy Signature, Automatic Signature, Anonymous


REFERENCES


  1. [1] Okamoto, E., “Integrated Security System and its Application to Anti-viral Methods,” Proc. 6th Virus and Security Conf (1993).
  2. [2] Hedberg, S., “Combating Computer Viruses: IBM’s New Computer Immune System,” Parallel & Distributed Technology: Systems & Applications, IEEE, Vol. 4, pp. 911 (1996).
  3. [3] Nachenberg, C., “Computer Virus-antivirus Coevolution,” Communications of the ACM, Vol. 40, pp. 46 51 (1997).
  4. [4] Subramanya, S. R. and Lakshminarasimhan, N., “Computer Viruses,” Potentials, IEEE, Vol. 20, pp. 1619 (2001).
  5. [5] Usuda, K., Mambo, M., Uyematsu, T. and Okamoto, E., “Proposal of an Automatic Signature Scheme Using a Compiler,” IEICE Transactions Fundamentals, Vol. E79-A, pp .94101 (1996).
  6. [6] Lin, W.-D. and Jan, J.-K., “An Automatic Signature Scheme Using a Compiler in Distributed Systems,” IEICE Transactions on Communications, Vol. E83-B pp. 935941 (2000).
  7. [7] Tseng, Y.-M., “Cryptanalysis and Restriction of an Automatic Signature Scheme in Distributed Systems,” IEICE Transactions on Communications, Vol. E86-B pp. 16791681 (2000).
  8. [8] Hwang, S.-J. and Li, E.-T., “A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems,” 2004 Information Security Conference, Taipei, Taiwan, R.O.C., pp. 345352 (2004).
  9. [9] Hawng, S.-J. and Chen, K.-H., “A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection,” Advanced Information Networking and Applications 2005, Taiwan, R.O.C., pp. 649654 (2005).
  10. [10] Chan, C.-C., “Anonymous (Multi-) Proxy Signature Schemes with Undeniable Agents,” Master Thesis, Tamkung University, Taiwan, R.O.C. (2005).
  11. [11] ElGamal, T., “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithm,” IEEE Transactions on Information Theory, Vol. 31, pp. 4691985 (1985).
  12. [12] FIPS PUB 186, February 1991, Digital signature Standard.


    



 

1.6
2022CiteScore
 
 
60th percentile
Powered by  Scopus

SCImago Journal & Country Rank

Enter your name and email below to receive latest published articles in Journal of Applied Science and Engineering.