The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Um novo esquema de protocolo é proposto aqui para compilar um programa ou executar um pacote de software. É uma modificação em que um arquivo pode ser detectado verificando a consistência do arquivo original com a assinatura digital que o acompanha. Quando um programa executável é criado, ele pode ser infectado por alguns vírus antes que a assinatura seja anexada a ele. A infecção não pode ser detectada pela verificação de assinatura e a origem da infecção também não pode ser especificada. Propomos um esquema de assinatura que permite assinar em uma etapa atômica após a criação de um programa executável. Nosso protocolo criptográfico e relacionado à segurança é usado para estabelecer comunicação segura em redes abertas e sistemas distribuídos inseguros. Quando um servidor compila um programa fonte, o compilador cria automaticamente o programa executável e sua assinatura. Assim, nenhum vírus pode infectar os programas executáveis sem ser detectado. Em nosso esquema de assinatura proposto, a assinatura do servidor é criada como um conjunto de números inteiros secretos do proxy, que são calculados a partir da chave secreta do fabricante do compilador. Cada compilador de servidor é propriedade de seu usuário cliente correspondente e é usado somente quando um valor secreto do servidor é inserido nele. As infecções de arquivos podem ser detectadas pelas assinaturas digitais comuns do servidor. O esquema de assinatura proposto, juntamente com a assinatura digital contra infecção na etapa de pré-processamento, permite-nos especificar a origem da infecção. Além disso, também oferecemos a capacidade de recuperação de mensagens para recuperar o arquivo original e salvar os arquivos infectados. A extensão mais natural deste novo esquema de protocolo é uma assinatura baseada em servidor que, integrada com pacotes de aplicativos, permitirá que o cliente e o servidor se comprometam um com o outro.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Whe-Dar LIN, Jinn-Ke JAN, "An Automatic Signature Scheme Using a Compiler in Distributed Systems" in IEICE TRANSACTIONS on Communications,
vol. E83-B, no. 5, pp. 935-941, May 2000, doi: .
Abstract: A novel protocol scheme is proposed here to compile a program or run a software package. It is a modification where a file can be detected by checking the consistency of the original file with its accompanying digital signature. When an executable program is created it may get infected with some viruses before the signature is attached to it. The infection cannot be detected by signature verification and the origin of the infection cannot be specified either. We propose a signature scheme that let one can sign right in atomic step after the creation of an executable program. Our security-related and cryptographic protocol is used to establish secure communication over insecure open networks and distributed systems. When a server compiles a source program, the compiler automatically creates both the executable program and its signature. Thus no virus can infect the executable programs without being detected. In our proposed signature scheme, the server signature is created a set of proxy secret integers, which is calculated from a compiler maker's secret key. Each server compiler is possessed by its corresponding client user and it is used only when a server secret value is fed into it. The infections of files can be detected by the ordinary server digital signatures. The proposed signature scheme together with the digital signature against infection in the preprocessing step enables us to specify the origin of the infection. Besides that, we also provide the message recovery capability to recover the original file to save the infected files. The most natural extension of this novel protocol scheme is a server-based signature that integrated together with application packages will allow client and the server to commit themselves to one another.
URL: https://global.ieice.org/en_transactions/communications/10.1587/e83-b_5_935/_p
Copiar
@ARTICLE{e83-b_5_935,
author={Whe-Dar LIN, Jinn-Ke JAN, },
journal={IEICE TRANSACTIONS on Communications},
title={An Automatic Signature Scheme Using a Compiler in Distributed Systems},
year={2000},
volume={E83-B},
number={5},
pages={935-941},
abstract={A novel protocol scheme is proposed here to compile a program or run a software package. It is a modification where a file can be detected by checking the consistency of the original file with its accompanying digital signature. When an executable program is created it may get infected with some viruses before the signature is attached to it. The infection cannot be detected by signature verification and the origin of the infection cannot be specified either. We propose a signature scheme that let one can sign right in atomic step after the creation of an executable program. Our security-related and cryptographic protocol is used to establish secure communication over insecure open networks and distributed systems. When a server compiles a source program, the compiler automatically creates both the executable program and its signature. Thus no virus can infect the executable programs without being detected. In our proposed signature scheme, the server signature is created a set of proxy secret integers, which is calculated from a compiler maker's secret key. Each server compiler is possessed by its corresponding client user and it is used only when a server secret value is fed into it. The infections of files can be detected by the ordinary server digital signatures. The proposed signature scheme together with the digital signature against infection in the preprocessing step enables us to specify the origin of the infection. Besides that, we also provide the message recovery capability to recover the original file to save the infected files. The most natural extension of this novel protocol scheme is a server-based signature that integrated together with application packages will allow client and the server to commit themselves to one another.},
keywords={},
doi={},
ISSN={},
month={May},}
Copiar
TY - JOUR
TI - An Automatic Signature Scheme Using a Compiler in Distributed Systems
T2 - IEICE TRANSACTIONS on Communications
SP - 935
EP - 941
AU - Whe-Dar LIN
AU - Jinn-Ke JAN
PY - 2000
DO -
JO - IEICE TRANSACTIONS on Communications
SN -
VL - E83-B
IS - 5
JA - IEICE TRANSACTIONS on Communications
Y1 - May 2000
AB - A novel protocol scheme is proposed here to compile a program or run a software package. It is a modification where a file can be detected by checking the consistency of the original file with its accompanying digital signature. When an executable program is created it may get infected with some viruses before the signature is attached to it. The infection cannot be detected by signature verification and the origin of the infection cannot be specified either. We propose a signature scheme that let one can sign right in atomic step after the creation of an executable program. Our security-related and cryptographic protocol is used to establish secure communication over insecure open networks and distributed systems. When a server compiles a source program, the compiler automatically creates both the executable program and its signature. Thus no virus can infect the executable programs without being detected. In our proposed signature scheme, the server signature is created a set of proxy secret integers, which is calculated from a compiler maker's secret key. Each server compiler is possessed by its corresponding client user and it is used only when a server secret value is fed into it. The infections of files can be detected by the ordinary server digital signatures. The proposed signature scheme together with the digital signature against infection in the preprocessing step enables us to specify the origin of the infection. Besides that, we also provide the message recovery capability to recover the original file to save the infected files. The most natural extension of this novel protocol scheme is a server-based signature that integrated together with application packages will allow client and the server to commit themselves to one another.
ER -