Method of Anti-Virus Protection Based on $(n,t)$ Threshold Proxy Signature with an Arbitrator
Modelirovanie i analiz informacionnyh sistem, Tome 21 (2014) no. 2, pp. 5-14.

Voir la notice de l'article provenant de la source Math-Net.Ru

The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an $(n;t)$-threshold proxy signature scheme with an arbitrator. The unique feature of the suggested method is in the absence of necessity to install anti-virus software in a mobile device. It will be enough only to have the software verifying digital signatures and the Internet. The method is used on the base of public keys infrastructure /PKI/, thus minimizing implementation expenses.
Mots-clés : anti-virus protection
Keywords: proxy signature, threshold proxy signature, PKI.
@article{MAIS_2014_21_2_a0,
     author = {E. A. Tolyupa},
     title = {Method of {Anti-Virus} {Protection} {Based} on $(n,t)$ {Threshold} {Proxy} {Signature} with an {Arbitrator}},
     journal = {Modelirovanie i analiz informacionnyh sistem},
     pages = {5--14},
     publisher = {mathdoc},
     volume = {21},
     number = {2},
     year = {2014},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/MAIS_2014_21_2_a0/}
}
TY  - JOUR
AU  - E. A. Tolyupa
TI  - Method of Anti-Virus Protection Based on $(n,t)$ Threshold Proxy Signature with an Arbitrator
JO  - Modelirovanie i analiz informacionnyh sistem
PY  - 2014
SP  - 5
EP  - 14
VL  - 21
IS  - 2
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/MAIS_2014_21_2_a0/
LA  - ru
ID  - MAIS_2014_21_2_a0
ER  - 
%0 Journal Article
%A E. A. Tolyupa
%T Method of Anti-Virus Protection Based on $(n,t)$ Threshold Proxy Signature with an Arbitrator
%J Modelirovanie i analiz informacionnyh sistem
%D 2014
%P 5-14
%V 21
%N 2
%I mathdoc
%U http://geodesic.mathdoc.fr/item/MAIS_2014_21_2_a0/
%G ru
%F MAIS_2014_21_2_a0
E. A. Tolyupa. Method of Anti-Virus Protection Based on $(n,t)$ Threshold Proxy Signature with an Arbitrator. Modelirovanie i analiz informacionnyh sistem, Tome 21 (2014) no. 2, pp. 5-14. http://geodesic.mathdoc.fr/item/MAIS_2014_21_2_a0/

[1] http://letitbit.org/terms/

[2] M. Mambo, K. Usuda, E. Okamoto, “Proxy signatures: Delegation of the power to sign messages”, IEICE Trans. Fundamentals, E79-A:9 (1996), 1338–1353

[3] M. Mambo, K. Usuda, E. Okamoto, “Proxy signatures for delegating signing operation”, Proc. of 3rd ACM Conference on Computer and Communications Security, CCS'96, ACM Press, 1996, 48–57

[4] S. Kim, S. Park, D. Won, “Proxy signatures, revisited”, Information and Communications Security, ICICS'97, LNCS 1334, Springer-Verlag, 1997, 223–232 | Zbl

[5] B. Lee, H. Kim, K. Kim, “Strong proxy signature and its applications”, Proceedings of the 2001 Symposium on Cryptography and Information Security, SCIS'01 (Oiso, Japan, Jan. 23–26, 2001), v. 2/2, 603–608 | Zbl

[6] Tolyupa E. A., “An Algorithm of $(n; t)$-Threshold Proxy Signature with an Arbitrator”, Modeling and analysis of information systems, 20:4 (2013), 55–70 (in Russian)

[7] C. Kaufman, R. Perlman, M. Speciner, Network Security: Private Communication in a Public World, Prentice-Hall PTR, 2002

[8] Gorbatov V. S., Polyanskaya O. Yu., Osnovy tekhnologii PKI, Goryachaya liniya-Telekom, M., 2004 (in Russian)

[9] M. Cooper, Y. Dzambasow, P. Hesse, S. Joseph, R. Nicholas, Internet X.509 Public Key Infrastructure: Certification Path Building, RFC 4158, September 2005

[10] Federalnyy zakon ob elektronnoy podpisi No 169-FZ ot 01.07.2011 (in Russian)

[11] J.-Y. Lee, J.-H. Cheon, S. Kim, An analysis of proxy signatures: Is a secure channel necessary?, LNCS, 2612, 2003, 68–79 | MR | Zbl

[12] G. Wang, F. Bao, J. Zhou, R. H. Deng, “Security Analysis of Some Proxy Signatures”, Proc. Information Security and Cryptology – ICISC. 2003, LNCS, 2971, Springer-Verlag, 2004, 305–319 | MR

[13] Alferov A. P., Zubov A. Yu., Kuzmin A. S., Cheremushkin A. V., Osnovy kriptografii, Gelios ARV, M., 2002 (in Russian)