The role of secret sharing in the distributed MARE protocols

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In a mobile agent based distributed system, agents must survive malicious failures of the hosts they visit, and they must be resilient to the potentially hostile actions of other hosts. The replication and voting are necessary to survive malicious behavior by visited hosts. However, faulty hosts that are not visited by agents can confound a naive replica management scheme by spoofing. This problem can be solved by cryptographic protocols. This paper describes the role of cryptographic methods in the protocols for the MARE architecture, which is a fault-tolerant mobile agent replication system. In this system, secret sharing takes on an important role in facilitating mobile processes by distributed authentication. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Park, K. (2005). The role of secret sharing in the distributed MARE protocols. In Lecture Notes in Computer Science (Vol. 3481, pp. 264–273). Springer Verlag. https://doi.org/10.1007/11424826_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free