With the development of Internet, traditional network is converting to active network computing, which makes the problem of mobile-code security emerge as one of the most challenges of research in Computer Science tod...With the development of Internet, traditional network is converting to active network computing, which makes the problem of mobile-code security emerge as one of the most challenges of research in Computer Science today. The literature introduces one method that solves the problem of mobile-code security: Language-Based Security,and decribes in detail several methods in this research area, such as Proof-Carrying Code(PCC) and Typed Assembly Language(TAL). Our resolvation of mobile-code safety is presented at last.展开更多
The paper review the public-key cryptosystems based on the error correcting codes such as Goppa code, BCH code, RS code, rank distance code, algebraic geometric code as well as LDPC code, and made the comparative anal...The paper review the public-key cryptosystems based on the error correcting codes such as Goppa code, BCH code, RS code, rank distance code, algebraic geometric code as well as LDPC code, and made the comparative analyses of the merits and drawbacks of them. The cryptosystem based on Goppa code has high security, but can be achieved poor. The cryptosystems based on other error correcting codes have higher performance than Goppa code. But there are still some disadvantages to solve. At last, the paper produce an assumption of the Niederreiter cascade combination cryptosystem based on double public-keys under complex circumstances, which has higher performance and security than the traditional cryptosystems.展开更多
文摘With the development of Internet, traditional network is converting to active network computing, which makes the problem of mobile-code security emerge as one of the most challenges of research in Computer Science today. The literature introduces one method that solves the problem of mobile-code security: Language-Based Security,and decribes in detail several methods in this research area, such as Proof-Carrying Code(PCC) and Typed Assembly Language(TAL). Our resolvation of mobile-code safety is presented at last.
基金Supported by the Postgraduate Project of Military Science of PLA(2013JY431)55th Batch of China Postdoctoral Second-Class on Fund Projects(2014M552656)
文摘The paper review the public-key cryptosystems based on the error correcting codes such as Goppa code, BCH code, RS code, rank distance code, algebraic geometric code as well as LDPC code, and made the comparative analyses of the merits and drawbacks of them. The cryptosystem based on Goppa code has high security, but can be achieved poor. The cryptosystems based on other error correcting codes have higher performance than Goppa code. But there are still some disadvantages to solve. At last, the paper produce an assumption of the Niederreiter cascade combination cryptosystem based on double public-keys under complex circumstances, which has higher performance and security than the traditional cryptosystems.