|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading
JaeYong JEONG Yongsu PARK Yookun CHO
Publication
IEICE TRANSACTIONS on Information and Systems
Vol.E88-D
No.5
pp.1077-1081 Publication Date: 2005/05/01 Online ISSN:
DOI: 10.1093/ietisy/e88-d.5.1077 Print ISSN: 0916-8532 Type of Manuscript: LETTER Category: Networks Keyword: mobile communications security, network security, authentication,
Full Text: PDF(111.4KB)>>
Summary:
When an application code is downloaded from an unknown server to the mobile device, it is important to authenticate the code. Usually, code execution is overlapped with downloading to reduce transfer/invocation delay. In this letter, we present an efficient code authentication scheme that permits overlapping of execution and downloading when the sequence of code execution is determined during the execution time. The proposed scheme is based on authentication trees. Compared with the tree chaining scheme, the proposed scheme has lower communication overhead and shorter average verification delay. Also, the computation cost of the proposed scheme on the receiver is much smaller than that of the tree chaining scheme.
|
|