WO2002037242A2 - Method and system for processing a request of a customer - Google Patents

Method and system for processing a request of a customer Download PDF

Info

Publication number
WO2002037242A2
WO2002037242A2 PCT/IB2001/001988 IB0101988W WO0237242A2 WO 2002037242 A2 WO2002037242 A2 WO 2002037242A2 IB 0101988 W IB0101988 W IB 0101988W WO 0237242 A2 WO0237242 A2 WO 0237242A2
Authority
WO
WIPO (PCT)
Prior art keywords
entity
request
computation
result
customer
Prior art date
Application number
PCT/IB2001/001988
Other languages
French (fr)
Other versions
WO2002037242A3 (en
Inventor
Joy ALGESHEIMER-MÜLLER
Christian Cachin
Jan Camenisch
Günter KARJOTH
Original Assignee
International Business Machines Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corporation filed Critical International Business Machines Corporation
Priority to IL15539401A priority Critical patent/IL155394A0/en
Priority to CA002426794A priority patent/CA2426794C/en
Priority to KR1020037006030A priority patent/KR100582393B1/en
Priority to JP2002539930A priority patent/JP4336105B2/en
Priority to EP01978722A priority patent/EP1368721A2/en
Priority to AU2002210814A priority patent/AU2002210814A1/en
Publication of WO2002037242A2 publication Critical patent/WO2002037242A2/en
Publication of WO2002037242A3 publication Critical patent/WO2002037242A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/465Distributed object oriented systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements

Definitions

  • the present invention relates to a method and system for processing a request of a customer. More particularly, the invention relates to cryptographic security of mobile agents.
  • mobile code is a programming paradigm that becomes more and more important. It provides a flexible way to structure cooperative computation in distributed systems.
  • the Internet is full of mobile code fragments, such as Java applets, which represent only a simple form of mobile code.
  • Mobile agents are mobile code that acts autonomously on behalf of a user for continuous collecting, filtering, and processing of information. They combine the benefits of the agent paradigm, such as reacting to a changing environment and autonomous operation, with the features of remote code execution; they operate in computer networks and are capable of moving from server to server as necessary to full their goals. Important applications include mobile computing, where bandwidth is limited or users are disconnected, data retrieval from large repositories, and configuration management of software and networks. The vision of mobile agents roaming the Internet may soon become reality as the paradigm is incorporated in large-scale applications.
  • Mobile code is to be understood as a program that is produced by one entity, called the originator, and is subsequently transferred to a entity, the host, immediately before it is executed by the host. In other words, no manual intervention, such as performing an installation or running a setup routine, is required on behalf of the host; mobile code comes ready to run.
  • mobile agents are capable of continued, autonomous operation disconnected from the originator and migrate freely to other hosts during their lifetime. Such agents have also been called itinerant agents.
  • Mobile code is exposed to various security threats: a malicious host may examine the code, try to learn the secrets carried by an agent, and exploit this knowledge in its interaction with the agent to gain an unfair advantage. A host might also try to manipulate the result of a computation.
  • a further form of code is active mobile code that performs some immediate action on the host. Thereby often information about the encrypted computation is leaked to the host whereby only the originator shall receive any output.
  • US Patent No. 6,026,374 is related to a system and method using of a trusted third party to provide a description of an information product to potential buyers without disclosing the entire contents of the information products, which might compromise the interests of the seller. The buyer trusts the third party to give an accurate description of the information that is for sale, while the seller trusts the third party not to reveal an excessive amount of the information product's content.
  • the system can include a seller of information products, a buyer of such products, and a trusted third party summarizer, each operating as a node in a communications network, such as the Internet.
  • a disadvantage of this system and method is that the third party has to be a trusted one and that this third party gets information and learns about everything. This could be dangerous if said third party gets cracked. Moreover, several messages are necessary to process the request of the buyer.
  • the invention provides a method and system for processing securely an originator request of a customer, i.e. the request being initiated by the customer.
  • This originator request is sent within a mobile code or agent to at least one first entity.
  • the method for processing the originator request comprises the steps of a) sending from the customer, i.e.
  • the originator request to the or each first entity; b) connecting the or each first entity to a computation entity; c) adding by the or each first entity, on receipt of the originator request, information concerning the originator request thereby forming a first-modified request; d) sending at least part of the first-modified request to at least the computation entity; e) having received at least part of the first-modified request by the computation entity deriving a computation-entity result from the at least part of the first-modified request; f) sending at least part of the computation-entity result to the or each first entity; g) having received at least part of the computation-entity result by the or each first entity deriving therefrom a first-entity result and forwarding it at least in part; and h) having received at least part of the first-entity result by the customer deriving therefrom a customer result.
  • the mobile code or agent comprising the originator request is sent around a network to several entities whereby the code or at least fragments thereof can be securely executed without any additional client hardware at the first entity.
  • Security is obtained through the computation entity that is a generic independent entity.
  • This independent entity can be a computation service that performs an encrypted computation on behalf of the mobile agent, but does not learn anything about the encrypted computation.
  • the independent entity can serve many different applications whereby nothing about its usage is necessary to know before deploying it. Privacy as well as authenticity for the mobile agents can be achieved.
  • the computation service itself does not learn anything about the computation, assumed it does not collude with the code originator or the first entity.
  • the independent entity may be universal rather than bound to a particular service or to an application context.
  • secure computation servers can be set up and operated by independent entities.
  • the method and system may be based on software and commodity hardware and therefore may be less expensive to build and operate than any solution involving specialized hardware.
  • a cryptographic operation can be applied to the mobile agent comprising the request or a result.
  • integrity for the mobile agent can be advantageously guaranteed.
  • the originator request is formed by applying an encrypted circuit construction, then the advantage occurs that a secure computation of the request can be achieved and the originator of that request can define how much information an entity shall receive.
  • the originator request may comprise a function in encrypted form. This is advantageous, because then other entities processing the originator request can not derive useful information therefrom except results which are designated to those entities.
  • the originator request, the first-modified request, the computation-entity result, and the first-entity result may comprise an encrypted part. This is advantageous, because then sensitive information is protected and is not readable as plaintext.
  • the originator request may comprise an offer or any other legal instrument. It may also comprises purchase information or customer information, such as the address for delivering or the credit card number for financial transactions.
  • the first entity comprises a web server offering a service or goods.
  • This service can merely be everything including sale, lease, license, or financing transaction.
  • the first-entity result may comprise a customer information concerning acceptance of the originator request. This is advantageous, because then the first-entity can deliver its service or goods immediately and initiate the necessary transactions.
  • the customer result may comprise the first-entity information concerning acceptance of the originator request.
  • the customer therefore knows that its originator request will be fulfilled and no further actions are necessary.
  • FIG. 1 shows an illustration of a communication flow according to the present invention.
  • FIG. 2 shows a more detailed illustration of a communication flow.
  • FIG. 3 shows another illustration of a communication flow.
  • a defining element of a mobile code or agent computation is that it proceeds autonomously and independently of the originator of the code.
  • the secure mobile agent computation is modeled in principle as depicted in Fig. 1, whereby the boxes are labeled according to the description below.
  • Fig. 1 shows a network, such as the Internet, whereby the code originator O is connected to a first entity H h that is further connected to a second entity H 2 .
  • the second entity H 2 is connected to an entity labeled with H j that further has a connection to an entity labeled with H j+ ⁇ , whereby several other entities are possible in-between as indicated by the dotted line.
  • the entity H 7+ ⁇ is connected to an entity labeled with H t that in the following is connected back to the code originator O.
  • Each of the entities Hi, H 2 , .... Hj, Hj + _, Hi is connected to a computing entity T.
  • the code originator O as well as each entity H H 2. .... Hj, H, + ⁇ , Hi sends and receives only a single message, that comprises the agent.
  • Fig. 2 depicts a more detailed illustration of the communication flow as shown in Fig. 1.
  • the code originator O that here is a customer O
  • H the first entity
  • the method for processing an originator request OR e.g. a price request including a threshold for a product, of the customer O runs as follows.
  • the customer O sends the originator request OR to the first entity H. This is indicated by the arrow labeled with m 0 R.
  • the first entity H offers several products to a particular price.
  • the first entity H connects to the computation entity T and adds, on receipt of the originator request OR, information I concerning the originator request OR, e.g.
  • This first-modified request FMR is sent to the computation entity T as indicated by the arrow labeled with m FM R- If the computation entity T has received the first-modified request FMR it derives therefrom a computation-entity result CER without learning anything from this computation. Afterwards, the computation-entity result CER is sent back to the first entity H as indicated by the arrow labeled with m C ER- If the first entity H has received the computation-entity result CER it derives therefrom a first-entity result EER and forwards this back to the customer O as indicated by the arrow labeled with m FE R.
  • the customer O is able to derive from the first-entity result EER a customer result CR.
  • This customer result CR provides the information to the customer O whether or not his originator request OR has been fulfilled.
  • the first entity H knows form the first-entity result EER whether or not its offer is acceptable to the customer O.
  • the originator request OR may contain information about the customer O, i.e. address, credit card information, which allows the first entity H to deliver the requested product immediately.
  • the mobile agent visits several vendor sites and compares offers.
  • the originator request OR does not only be based on price, but can also include other attributes.
  • the originator or customer O wants to maintain the privacy of his preferences, but a shop has an interest to learn the buyer's strategy as well as information about other vendor's offers.
  • the vendor wants to keep its method of calculating the price secret. All these requirements can be fulfilled by the described scheme for secure mobile code.
  • a shopping agents is traveling around the network and collects offers from several vendors or entities Hi, H 2 , ..., H j , H, + ⁇ , Hi, whereby a prior agreement on the data format of the offers is helpful.
  • Fig. 3 shows another embodiment using the same or like parts as shown in Figs. 1 and 2. The difference is the code originator 0 sends directly to each entity H ; , H 2 , ..., H, its originator request OR, whereby the originator request OR can be the same or different to each entity Hi,
  • an electronic negotiation is described.
  • the electronic negotiation between a buyer and a single vendor can take place using the scheme for secure mobile code that visits a single host or entity H.
  • the vendor would act as the originator O and download an applet to the buyer's browser (as is already quite common on the Internet).
  • the applet is executed using the help of the computation entity T by the buyer and the offer is displayed to the buyer.
  • the vendor may obtain some information as well, which it would have to spell out clearly in a "privacy statement" accompanying the applet.
  • Bidding agents can implement a complex strategy being a function of time and other participants' behavior, which gives the bidder more flexibility compared to traditional single-parameter auctions based purely on price.
  • a bidder is interested to define his bidding behavior as dynamically as possible, for example making the valuation of a lot depend on other winning bids that he observed in the previous rounds. If the bidders can express their strategies as a computable function, then one may construct a circuit to compute the auction function, i.e., the outcome of the auction, with the strategies as the private inputs of all participants. This would require an auction agent that visits each bidder only once.
  • each round of the auction could also be performed securely by an auction applet that visits each bidder once and returns to the auctioneer. There it outputs the winning bids or the end of the auction if the bids did not exceed the minimum increment. If the scheme for secure mobile computing is used, then there is no single entity Hi, H 2 , ..., H j , H j+ ⁇ , Hi that sees all bids (like the auctioneer, its computer system, or its operators). Generalized auctions are common in electricity markets, equities trading, bandwidth auctions, and transportation exchanges, and bidders often have preferences over combination of items.
  • the above scheme assumes that the order in which the agent visits all entities is fixed. It is extended to allow for the sequence to depend on Zj by introducing a function ⁇ : Z / ⁇ 1, ..., ⁇ and sending the agent to H ⁇ ( z; ) from H j .
  • the function g yields O's output ⁇ and h gives H's oulput z.
  • a computation entity T that can be a generic secure computation service, is provided.
  • This computation entity T is on-line and connected to all entities Hi, ..., or hosts running agent applications and is at their disposal for securing agent computations.
  • the computation entity T itself does not gain any information about the computation, no matter how it behaves, under the assumptions that (1) the computation entity T does not collude with the originator against any entity, and (2) the computation entity T does not collude with any entity against the originator or against any other entity. All computations proceed with minimal or no interaction.
  • the scheme is generic and not bound to any particular application. Hence the service of the computation entity T might be offered as a public service for "secure mobile agent computation" on the Internet.
  • the scheme is based on functions in encrypted form. For example, encrypting a binary digital circuit realizes the part of the agent computation. This can be realized by an encrypted circuit construction as described in the following.
  • G is encrypted
  • JJ Alice and Bob engage in a protocol for oblivious transfer, for example, as disclosed by S. Even, O. Goldreich and A. Lempel in "A randomized protocol for signing contract", Communications of the ACM 28 (1985), 637-647 or by G. Brassard, C. Crepeau, and J.-M. Robert in "Information-theoretic reductions among disclosure problems", Proc. 27th IEEE Symposium on Foundations of Computer Science (FOCS), 1986.
  • This is an interactive two-party protocol for a sender with input two messages mo and m_ and a chooser with input a bit ⁇ . At the end, the chooser receives m ⁇ but does not learn anything about rn ⁇ ® ⁇ , and the sender has no information about ⁇ .
  • the second algorithm ..., K' ⁇ y takes as inputs the encrypted circuit, a representation of x, and a representation of y by the respective keys. It outputs the keys U , ..., U réelle' z from which Bob can recover z, and if Alice and Bob obey the protocol, then z
  • Block ciphers are very fast cryptographic primitives, even if implemented in software.
  • the following describes how to use the encrypted circuit construction for realizing secure mobile code computation with a single or first entity.
  • the extension to multiple entities is considered after that.
  • the computation entity T publishes the public key of an encryption scheme.
  • the corresponding encryption and decryption operations are denoted by E ⁇ (-) and D (-), respectively. All entities can communicate over secure authenticated links, which could be realized by using standard public-key encryption and digital signatures.
  • the basic scheme is that O constructs an encrypted circuit G computing the two values ⁇ and z.
  • the code originator O sends G to the first entity H, but encrypts all keys in X for T and does not include the key pairs in U which correspond to ⁇ (denoted by x ) so that the first entity H will not learn anything about ⁇ .
  • the first entity H selects from X the encrypted keys representing y and invokes the computation entity T to decrypt them in a single round of interaction.
  • the first entity H evaluates the circuit and obtains z; it also returns the keys in the circuit output representing ⁇ to O, who can determine ⁇ from this.
  • the scheme proceeds in five steps 1) to 5), as described in the following.
  • O chooses a string id that uniquely identifies the computation, e.g., containing the name of O, a description of g and h, and a sequence counter.
  • O invokes construct(C) and obtains (G, £, X, U) as above with U consisting of n x + n z key pairs in total.
  • U x denotes the pairs in It with indices 1, ..., n x and O_ denotes those with indices n x + 1, ..., n x + n z .
  • K ⁇ , b E T (id ⁇ i ⁇ Ki, b ).
  • the computation entity T should use a public-key cryptosystem that is secure against adaptive chosen-ciphertext attacks, which means non-malleable, as described by D. Dolev, C. Dwork, and M. Naor in "Non-malleable cryptography", SIAM Journal on Computing 30 (2000), no. 2, 391-437.
  • the code originator O and the first entity H should also commit to their inputs. In a practical system, all of these can be realized in the so-called "random oracle model" as described, for example, by M. Bellare and P.
  • the code originator O prepares one encrypted circuit G for each entity Hi, ..., Hi and incorporates the encrypted state x s . ⁇ from ⁇ Hnto C® fo ⁇ j > 1. This is achieved by using the output keys U ⁇ , ..., Un ⁇ 'ftom C ⁇ -1) for decrypting a hidden representation of the inputs to
  • the cryptosystem includes sufficient redundancy such that given a potential key U and a ciphertext c one can determine with high probability whether c results from an encryption under U.
  • the modifications to the scheme are as follows.
  • Each entity interprets each £/,• as a symmetric key to E, determines which one of the ciphertexts V® 0 and V® t it decrypts, and then decrypts the one that matches. This yields K. , an oblivious representation of the tth bit in the current state xj of the agent. Those keys are then used to evaluate C .
  • Hj When Hj has obtained its output from evaluating C®, it forwards all data that it has received from Hj . together with if , ..., Un x to H y + i . At the end of the circle, H returns if to the code originator O.
  • the computation entity T generates the code
  • the computation entity T In a variation where the roles of O and T are switched, the computation entity T generates the encrypted circuit. Because it is trusted to follow the protocol one does not have to add a costly zero-knowledge proof for correctness of the whole circuit. Therefore, the operations of the other entities and the corresponding proofs ensuring robustness become much simpler.
  • the computation entity T has to know g and h for constructing the circuit, but it may obtain a description of C from O in a first protocol message.
  • a three-party oblivious transfer protocol is used, as introduced by M. Naor, B. Pinkas, and R. Sumner in "Privacy preserving auctions and mechanism design", Proc. 1st ACM Conference on Electronic Commerce, 1999, in which the role of the chooser is separated among the chooser and a third party, called the receiver.
  • the receiver gets the output message ⁇ specified by the chooser, who itself learns nothing. This so-called "proxy" oblivious transfer can be realized using three message flows: from chooser to receiver and from receiver to sender and back.
  • the protocol uses also a one-round implementation of standard oblivious transfer between two parties, which can be realized using the method of C. Cachin, J. Camenisch, J. Kilian, and J. M ⁇ ller, published in their article "One-round secure computation and secure autonomous mobile agents", at Proc. 27th International Colloquium on Automata, Languages and Programming (ICALP) (U. Montanari, J. P. Rolim, and E. Welzl, eds.), Lecture Notes in Computer Science, vol. 1853, Springer, July 2000, pp. 512-523.
  • ICALP International Colloquium on Automata, Languages and Programming
  • H also prepares its input to n y parallel one-round oblivious transfers (playing the role of the chooser), one for each bit of y. It sends these to T, together with the descriptions of C and Eo(-)', T will send the key pairs K in the one-round oblivious transfers.
  • T invokes construct(Q to obtain 6 and the key pairs £ , X , and U . It replies to H withEoC ⁇ ), G, U z and the final flows in all oblivious transfer protocols.
  • H can determine the keys L , ...,L n ' ⁇ representing x and the keys K , ...,L n ' representing y. It runs ev ⁇ luate( (7 , L , ...,L embrace ! x ,K , ...,K' ny ) to obtain U , ..., U' ll ⁇ +nz as above. Then it determines its output z from U n ' ⁇ +1 , ..., U réelle' x+nz and from U z , and it forwards U ⁇ , ..., U n ' ⁇ together with E 0 (U x )to O. This enables O to obtain its output ⁇ .
  • the protocol shows an extension of the protocol from a single host or first entity Hi to / hosts Hi, ..., Hi.
  • the protocol starts as before for the first host.
  • the steps for H 2 , ..., Hi are slightly different: three-party oblivious transfer and encryption under Eo are not used.
  • T encrypts the keys ® in the input of C ⁇ and representing the state x j - ⁇ of the agent under the output keys in li ⁇ > from G ⁇ as before V®.
  • the keys lt° '_1) can be stored by T between step j - 1 and step j or they can be sent along with the protocol flow and are transmitted to T via Hj .
  • i and Hj whereby they are encrypted byEr(-)- h addition, the last host obtains U x encrypted with Eo(-) from T and forwards this to O as above.
  • the communication pattern is the same as in the basic scheme: there is one message from O to Hi, one from each Hj . i to Hj and one from to O, plus one communication flow between each host and the computation entity T.
  • Robustness can be added by using non-malleable public-key encryption schemes and non-interactive zero-knowledge proofs. However, the result will be much more practical because zero-knowledge proofs are not needed for the potentially large encrypted circuit.
  • the encrypted circuit construction can be implemented by a block cipher instead of public-key operations.
  • the present invention can be realized in hardware, software, or a combination of hardware and software. Any kind of computer system - or other apparatus adapted for carrying out the method described herein - is suited.
  • a typical combination of hardware and software could be a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
  • the present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which - when loaded in a computer system - is able to carry out these methods.
  • Computer program means or computer program in the present context mean any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following a) conversion to another language, code or notation; b) reproduction in a different material form.

Abstract

The invention provides a method and system for processing securely an originator request of a customer. This originator request can be sent to at least one first entity. The method for processing the originator request comprises the steps of (a) sending from the customer the originator request to the or each first entity; (b) connecting the or each first entity to a computation entity; (c) adding by the or each first entity, information concerning the originator request; (d) sending at least part of the first modified request to at least the computation entity; (e) deriving a computation-entity result from the at least part of the first-modified request; (f) sending at least part of the computation-entity result to the or each first entity; (g) deriving therefrom a first-entity result and forwarding it at least in part; and (h) deriving therefrom a customer result.

Description

METHOD AND SYSTEM FOR PROCESSING A REQUEST OF A CUSTOMER
TECHNICAL FIELD
The present invention relates to a method and system for processing a request of a customer. More particularly, the invention relates to cryptographic security of mobile agents.
BACKGROUND OF THE INVENTION
hi the increasingly networked world, mobile code is a programming paradigm that becomes more and more important. It provides a flexible way to structure cooperative computation in distributed systems. At present, the Internet is full of mobile code fragments, such as Java applets, which represent only a simple form of mobile code.
Mobile agents are mobile code that acts autonomously on behalf of a user for continuous collecting, filtering, and processing of information. They combine the benefits of the agent paradigm, such as reacting to a changing environment and autonomous operation, with the features of remote code execution; they operate in computer networks and are capable of moving from server to server as necessary to full their goals. Important applications include mobile computing, where bandwidth is limited or users are disconnected, data retrieval from large repositories, and configuration management of software and networks. The vision of mobile agents roaming the Internet may soon become reality as the paradigm is incorporated in large-scale applications.
Mobile code is to be understood as a program that is produced by one entity, called the originator, and is subsequently transferred to a entity, the host, immediately before it is executed by the host. In other words, no manual intervention, such as performing an installation or running a setup routine, is required on behalf of the host; mobile code comes ready to run. Moreover, mobile agents are capable of continued, autonomous operation disconnected from the originator and migrate freely to other hosts during their lifetime. Such agents have also been called itinerant agents. Mobile code is exposed to various security threats: a malicious host may examine the code, try to learn the secrets carried by an agent, and exploit this knowledge in its interaction with the agent to gain an unfair advantage. A host might also try to manipulate the result of a computation.
There are at least two security problems that arise in the area of mobile code: (1) protecting the host from malicious code and (2) protecting the code from malicious hosts. The first problem has received considerable attention because of the imminent threat of computer viruses and Trojan horses. Current solutions are to run mobile code in a so-called sandbox with fine-grained access control and to apply code signing for exploiting a trust relation with the code producer.
Protecting mobile code was deemed impossible by some mobile code researchers until T. Sander and C. F. Tschudin realized that tools from theoretical cryptography could be useful to execute mobile code in an encrypted form on an untrusted host, as described in their article "Protecting mobile agents against malicious hosts, Mobile Agents and Security" (G. Vigna, ed.), Lecture Notes in Computer Science, vol. 1419, Springer, 1998. Most protocols for so-called secure computation require several rounds of interaction, however, and are not applicable to achieve secrecy for mobile applications and integrity for their outputs. Sander and Tschudin concluded that only functions representable as polynomials can be computed securely in this manner. Subsequent work of Sander et al. extends this to all functions computable by circuits of logarithmic depth, as disclosed by T. Sander, A. Young, and M. Yung in "Non-interactive CryptoComputing for NC1", Proc. 40th IEEE Symposium on Foundations of Computer Science (FOCS), 1999.
A further form of code is active mobile code that performs some immediate action on the host. Thereby often information about the encrypted computation is leaked to the host whereby only the originator shall receive any output.
A basic problem with active mobile code is that a malicious host can observe the output of the computation and simply run the code again with a different input. The only existing defense for active mobile code against a malicious host uses trusted hardware. This has been proposed and entails running mobile code exclusively inside tamperproof hardware, encrypting it as soon as it leaves the trusted environment. US Patent No. 6,026,374 is related to a system and method using of a trusted third party to provide a description of an information product to potential buyers without disclosing the entire contents of the information products, which might compromise the interests of the seller. The buyer trusts the third party to give an accurate description of the information that is for sale, while the seller trusts the third party not to reveal an excessive amount of the information product's content. The system can include a seller of information products, a buyer of such products, and a trusted third party summarizer, each operating as a node in a communications network, such as the Internet. A disadvantage of this system and method is that the third party has to be a trusted one and that this third party gets information and learns about everything. This could be dangerous if said third party gets cracked. Moreover, several messages are necessary to process the request of the buyer.
SUMMARY AND ADVANTAGES OF THE INVENTION
The invention provides a method and system for processing securely an originator request of a customer, i.e. the request being initiated by the customer. This originator request is sent within a mobile code or agent to at least one first entity. The method for processing the originator request comprises the steps of a) sending from the customer, i.e. form the customer's device, the originator request to the or each first entity; b) connecting the or each first entity to a computation entity; c) adding by the or each first entity, on receipt of the originator request, information concerning the originator request thereby forming a first-modified request; d) sending at least part of the first-modified request to at least the computation entity; e) having received at least part of the first-modified request by the computation entity deriving a computation-entity result from the at least part of the first-modified request; f) sending at least part of the computation-entity result to the or each first entity; g) having received at least part of the computation-entity result by the or each first entity deriving therefrom a first-entity result and forwarding it at least in part; and h) having received at least part of the first-entity result by the customer deriving therefrom a customer result.
It is an advantage that only the customer learns the result of the calculation, whereby other entities or hosts learn nothing at all except results which are designated to them. The mobile code or agent comprising the originator request is sent around a network to several entities whereby the code or at least fragments thereof can be securely executed without any additional client hardware at the first entity. Security is obtained through the computation entity that is a generic independent entity. This independent entity can be a computation service that performs an encrypted computation on behalf of the mobile agent, but does not learn anything about the encrypted computation. The independent entity can serve many different applications whereby nothing about its usage is necessary to know before deploying it. Privacy as well as authenticity for the mobile agents can be achieved. Moreover, the computation service itself does not learn anything about the computation, assumed it does not collude with the code originator or the first entity.
The independent entity may be universal rather than bound to a particular service or to an application context. For example, secure computation servers can be set up and operated by independent entities.
The method and system may be based on software and commodity hardware and therefore may be less expensive to build and operate than any solution involving specialized hardware.
A cryptographic operation can be applied to the mobile agent comprising the request or a result. Thus, integrity for the mobile agent can be advantageously guaranteed.
When the originator request is formed by applying an encrypted circuit construction, then the advantage occurs that a secure computation of the request can be achieved and the originator of that request can define how much information an entity shall receive.
The originator request may comprise a function in encrypted form. This is advantageous, because then other entities processing the originator request can not derive useful information therefrom except results which are designated to those entities.
The originator request, the first-modified request, the computation-entity result, and the first-entity result may comprise an encrypted part. This is advantageous, because then sensitive information is protected and is not readable as plaintext. The originator request may comprise an offer or any other legal instrument. It may also comprises purchase information or customer information, such as the address for delivering or the credit card number for financial transactions.
The first entity comprises a web server offering a service or goods. This service can merely be everything including sale, lease, license, or financing transaction.
The first-entity result may comprise a customer information concerning acceptance of the originator request. This is advantageous, because then the first-entity can deliver its service or goods immediately and initiate the necessary transactions.
The customer result may comprise the first-entity information concerning acceptance of the originator request. The customer therefore knows that its originator request will be fulfilled and no further actions are necessary.
DESCRIPTION OF THE DRAWINGS
Preferred embodiments of the invention are described in detail below, by way of example only, with reference to the following schematic drawings.
FIG. 1 shows an illustration of a communication flow according to the present invention. FIG. 2 shows a more detailed illustration of a communication flow.
FIG. 3 shows another illustration of a communication flow.
The drawings are provided for illustrative purpose only and do not necessarily represent practical examples of the present invention to scale. DESCRIPTION OF THE INVENTION
With general reference to the figures the features of a method and system for processing a request of a customer using cryptographic functions is described in more detail below. When referring to the word customer, it appears obvious that a device, such as a computer or mobile appliance, used by the customer is meant.
A defining element of a mobile code or agent computation is that it proceeds autonomously and independently of the originator of the code. The secure mobile agent computation is modeled in principle as depicted in Fig. 1, whereby the boxes are labeled according to the description below.
There are a code originator O, and / hosts, hereinafter referred to as entities Hi, ..., Hi, on which the mobile agent, hereinafter short agent, runs.
Fig. 1 shows a network, such as the Internet, whereby the code originator O is connected to a first entity Hh that is further connected to a second entity H2 . The second entity H2 is connected to an entity labeled with Hj that further has a connection to an entity labeled with Hj+ι, whereby several other entities are possible in-between as indicated by the dotted line. The entity H7+ι is connected to an entity labeled with Ht that in the following is connected back to the code originator O. Each of the entities Hi, H2, .... Hj, Hj+_, Hi is connected to a computing entity T.
The code originator O as well as each entity H H2. .... Hj, H,+ι, Hi sends and receives only a single message, that comprises the agent. The message that the code originator O sends to the first entity Hz is denoted by m0 and the message that a further entity Hj sends to H,+1 by ,- for j = 1, ..., l-l, and the message that the last entity H; returns to the code originator O is denoted
Fig. 2 depicts a more detailed illustration of the communication flow as shown in Fig. 1. The code originator O, that here is a customer O, is connected to the first entity, here labeled with H, that further is connected to the computing entity T. The method for processing an originator request OR, e.g. a price request including a threshold for a product, of the customer O runs as follows. The customer O sends the originator request OR to the first entity H. This is indicated by the arrow labeled with m0R. The first entity H offers several products to a particular price. The first entity H connects to the computation entity T and adds, on receipt of the originator request OR, information I concerning the originator request OR, e.g. its price willing to accept, thereby forming a first-modified request FMR. This first-modified request FMR is sent to the computation entity T as indicated by the arrow labeled with mFMR- If the computation entity T has received the first-modified request FMR it derives therefrom a computation-entity result CER without learning anything from this computation. Afterwards, the computation-entity result CER is sent back to the first entity H as indicated by the arrow labeled with mCER- If the first entity H has received the computation-entity result CER it derives therefrom a first-entity result EER and forwards this back to the customer O as indicated by the arrow labeled with mFER. The customer O is able to derive from the first-entity result EER a customer result CR. This customer result CR provides the information to the customer O whether or not his originator request OR has been fulfilled. The first entity H knows form the first-entity result EER whether or not its offer is acceptable to the customer O. The originator request OR may contain information about the customer O, i.e. address, credit card information, which allows the first entity H to deliver the requested product immediately.
In the embodiment described above, the mobile agent visits several vendor sites and compares offers. The originator request OR does not only be based on price, but can also include other attributes. The originator or customer O wants to maintain the privacy of his preferences, but a shop has an interest to learn the buyer's strategy as well as information about other vendor's offers. For complex offers where the price is determined individually for each customer based on its needs, such as in the insurance market, the vendor wants to keep its method of calculating the price secret. All these requirements can be fulfilled by the described scheme for secure mobile code.
In another embodiment, a shopping agents is traveling around the network and collects offers from several vendors or entities Hi, H2, ..., Hj, H,+ι, Hi, whereby a prior agreement on the data format of the offers is helpful.
Fig. 3 shows another embodiment using the same or like parts as shown in Figs. 1 and 2. The difference is the code originator 0 sends directly to each entity H;, H2, ..., H, its originator request OR, whereby the originator request OR can be the same or different to each entity Hi,
In a further embodiment an electronic negotiation is described. The electronic negotiation between a buyer and a single vendor can take place using the scheme for secure mobile code that visits a single host or entity H. Typically, the vendor would act as the originator O and download an applet to the buyer's browser (as is already quite common on the Internet). The applet is executed using the help of the computation entity T by the buyer and the offer is displayed to the buyer. The vendor may obtain some information as well, which it would have to spell out clearly in a "privacy statement" accompanying the applet.
Auctions with generalized bidding strategies present an interesting application area for secure mobile agents. Bidding agents can implement a complex strategy being a function of time and other participants' behavior, which gives the bidder more flexibility compared to traditional single-parameter auctions based purely on price. As the value of the lots is interrelated, a bidder is interested to define his bidding behavior as dynamically as possible, for example making the valuation of a lot depend on other winning bids that he observed in the previous rounds. If the bidders can express their strategies as a computable function, then one may construct a circuit to compute the auction function, i.e., the outcome of the auction, with the strategies as the private inputs of all participants. This would require an auction agent that visits each bidder only once. However, in the likely case that the bidders are unable to express their strategies mathematically, each round of the auction could also be performed securely by an auction applet that visits each bidder once and returns to the auctioneer. There it outputs the winning bids or the end of the auction if the bids did not exceed the minimum increment. If the scheme for secure mobile computing is used, then there is no single entity Hi, H2, ..., Hj, Hj+ι, Hi that sees all bids (like the auctioneer, its computer system, or its operators). Generalized auctions are common in electricity markets, equities trading, bandwidth auctions, and transportation exchanges, and bidders often have preferences over combination of items.
In the following, implementation details are described. Computation: Let the state of the mobile agent be an element of a set X . Its initial state x0 is determined by O. Let the input by Hj be an element of a set Yj and the output to H, an element of Zj. The agent computation on the entity Hj is represented by two functions
gj -. Xx Yj → X and A, : XX YJ → ZJ
that determine the new state Xj = gj(xj-ι,yj) of the agent and the output Zj = hj(xj-\,yj). O obtains the final state ξ = xι e X of the agent. The functions gj and hj are known to all entities
A mobile computing scheme comprises 2/ + 2 algorithms A0, A ..., At,
Figure imgf000011_0001
..., Bι, and D such that for ally = 1, ..., / and XQ e X, yj e Yj, and with
mo =A0(^o)
mj -Aj(mj- yj) fory' = 1, ..., /
Zj = Bj(mj-ι , yj for; = 1 , ..., /
ξ = D(mι)
the following two conditions Correctness and Privacy hold.
Correctness: ζ = gι(xι-ι,yι) and Zj = hj(xj-ι,yj) for = 1, ..., / using
*f = gj'(-(g2(gι(χo,y\),y2)...),yf) for j ' = l, ...,l-l.
Privacy: The inputs, outputs, and the computations of all entities remain hidden from the originator and from all other entities, except for what follows from their outputs. O learns only ξ but nothing else about any y} than what follows from x0 and ξ, and similarly, Hj learns only zj but nothing about xo and y- for j'<j than what follows from zj and >j .
For simplicity reasons, the above scheme assumes that the order in which the agent visits all entities is fixed. It is extended to allow for the sequence to depend on Zj by introducing a function π : Z/ →{ 1, ..., } and sending the agent to Hπ(z;) from Hj. In the case of mobile code applications with a single host, i.e. the first entity H only, the function g yields O's output ξ and h gives H's oulput z.
A computation entity T, that can be a generic secure computation service, is provided. This computation entity T is on-line and connected to all entities Hi, ..., or hosts running agent applications and is at their disposal for securing agent computations. The computation entity T itself does not gain any information about the computation, no matter how it behaves, under the assumptions that (1) the computation entity T does not collude with the originator against any entity, and (2) the computation entity T does not collude with any entity against the originator or against any other entity. All computations proceed with minimal or no interaction. The scheme is generic and not bound to any particular application. Hence the service of the computation entity T might be offered as a public service for "secure mobile agent computation" on the Internet. Clients or customers who use this service in the role of O or H (e.g., for comparison shopping) do not have to fear that the computation entity T has "second thoughts" trying to violate their privacy (e.g., of customer profiling and collecting marketing data). Moreover, the computation entity T itself has an interest to maintain its reputation as a security provider.
The scheme is based on functions in encrypted form. For example, encrypting a binary digital circuit realizes the part of the agent computation. This can be realized by an encrypted circuit construction as described in the following.
Encrypted circuit construction
The encrypted circuit construction of Yao, as introduced by A. C. Yao in his article "How to generate and exchange secrets" at Proc. 27th IEEE Symposium on Foundations of Computer Science (FOCS), 1986, pp. 162-167, is an interactive protocol for secure function evaluation between two parties or entities. This is described for a binary function g(-, •) and parties Alice (with input x) and Bob (with input y). Bob receives the output z = g(x, y) but learns nothing else and Alice learns nothing at all.
Let (xι, ...,x„x), (yi, ...,y.iy), and (zι, ...,znz) denote the binary representations of x, y, and z, respectively, and let C denote a polynomial-sized binary circuit computing g. The components of Yao's construction are (I) a first algorithm construct that Alice uses to construct an encrypted circuit, (TJ) a transfer protocol between Alice and Bob, and (JTf) a second algorithm evaluate allowing Bob to retrieve g(x, y). More precisely, these procedures are as follows.
(I) The probabilistic first algorithm construct(Q takes the circuit as input and outputs the tuple (G, £,, X, U), where G may be viewed as an encrypted version of the nx + rc input circuit C(; •) and where £, X, and It denote lists of so called key pairs £ = (Lι,o,Lι.ι), ..., (Lnχfi,L„x_ι)
Figure imgf000013_0001
U = (Ul,0, U l), ..., (Unz,0, UllzΛ) corresponding to x, y, and z, respectively.
In order to compute C(x, y) from the encryption 6 , Bob needs one "key" for each input bit: Li>b corresponds to input bit x_- = b and Kib corresponds to input bit y; = b. The keys £/,-,o and £/;,ι represent the output bits of the encrypted circuit, i.e., if evaluation produces £ ,,& , then the output bit zi is set to b.
The particular method in which G is encrypted ensures that for every gate in the circuit, given two keys representing its input bits, the key representing the resulting output bit can be readily computed, but no information is revealed about which cleartext bit it represents.
(JJ) Alice and Bob engage in a protocol for oblivious transfer, for example, as disclosed by S. Even, O. Goldreich and A. Lempel in "A randomized protocol for signing contract", Communications of the ACM 28 (1985), 637-647 or by G. Brassard, C. Crepeau, and J.-M. Robert in "Information-theoretic reductions among disclosure problems", Proc. 27th IEEE Symposium on Foundations of Computer Science (FOCS), 1986. This is an interactive two-party protocol for a sender with input two messages mo and m_ and a chooser with input a bit σ. At the end, the chooser receives mσ but does not learn anything about rnσ®ι, and the sender has no information about σ.
More precisely, Alice acts as the sender and Bob obtains for every bit y,- of his input the value K = Ki,r, but learns nothing about Ki,y.φ ι . At the same time, Alice learns nothing about y,-. In addition, Alice computes the keys representing* as L = L,-,*, for i = 1, ..., nx and sends G,
Figure imgf000014_0001
(rπ) The second algorithm
Figure imgf000014_0002
..., K'Λy) takes as inputs the encrypted circuit, a representation of x, and a representation of y by the respective keys. It outputs the keys U , ..., U„'z from which Bob can recover z, and if Alice and Bob obey the protocol, then z
= g(χ, y)-
Implementing the first and second algorithms construct and evaluate can be achieved by pseudo-random functions, as for example proposed by O. Goldreich, S. Goldwasser, and S. Micali in "How to construct random functions", Journal of the ACM 33 (1986), no. 4, 792-807, which are realized in practice by block ciphers. Block ciphers are very fast cryptographic primitives, even if implemented in software.
The following describes how to use the encrypted circuit construction for realizing secure mobile code computation with a single or first entity. The extension to multiple entities is considered after that.
The computation entity T publishes the public key of an encryption scheme. The corresponding encryption and decryption operations are denoted by Eτ(-) and D (-), respectively. All entities can communicate over secure authenticated links, which could be realized by using standard public-key encryption and digital signatures.
The basic scheme is that O constructs an encrypted circuit G computing the two values ζ and z. The code originator O sends G to the first entity H, but encrypts all keys in X for T and does not include the key pairs in U which correspond to ξ (denoted by x) so that the first entity H will not learn anything about ξ. Next, the first entity H selects from X the encrypted keys representing y and invokes the computation entity T to decrypt them in a single round of interaction. Then, the first entity H evaluates the circuit and obtains z; it also returns the keys in the circuit output representing ξ to O, who can determine ξ from this.
Let C be the binary circuit computing (ξ,z) = (g(x, y), h(x, y)) from the same inputs with nx + ny input bits
Figure imgf000014_0003
...,yny and nx + nz output bits ξ ..., ξ, ..., Znz, slightly modifying the notation from the previous section. The scheme proceeds in five steps 1) to 5), as described in the following.
1) O chooses a string id that uniquely identifies the computation, e.g., containing the name of O, a description of g and h, and a sequence counter. O invokes construct(C) and obtains (G, £, X, U) as above with U consisting of nx + nz key pairs in total. Ux denotes the pairs in It with indices 1, ..., nx and O_ denotes those with indices nx + 1, ..., nx + nz.
For i = 1, ..., ny and b e {0, 1} , it computes
Kι,b = ET(id \\ i \\ Ki,b).
Let X denote the list of pairs of all such K. Then O lets L = Lι,Xi as above for = 1, ..., nx and sends
to the first entity H.
2) The first entity H sets Kt = K^Tl for i = 1, ..., ny to be the encryptions representing its input y and sends them to the computation entity T along with id.
3) The computation entity T decrypts Kt for i = 1, ..., ny and verifies that the tfh decrypted string contains the identifier id and index i. If all checks are successful, the computation entity T returns the decrypted eysK\, ..., K'lly to the first entity H.
4) The first entity H invokes the second algorithm evaluate(G, L , ...,Ln'χ,K , ...,Kn'y) and obtains U , ..., Un'χ+Ilz. Then, the first entity H determines z = (zι, ...,z,ιz) such that Unx+i,z; = Ul'lχ+i for i = 1, ..., nz and forwards the remaining values U , ..., Ul' to the code originator O.
5) The code originator O determines its output ξ = (ξι, ..., ξ) such that Uι.ξ. =
Figure imgf000015_0001
for i = 1, ..., nx. For increased security, the computation entity T should use a public-key cryptosystem that is secure against adaptive chosen-ciphertext attacks, which means non-malleable, as described by D. Dolev, C. Dwork, and M. Naor in "Non-malleable cryptography", SIAM Journal on Computing 30 (2000), no. 2, 391-437. The code originator O and the first entity H should also commit to their inputs. In a practical system, all of these can be realized in the so-called "random oracle model" as described, for example, by M. Bellare and P. Rogaway in "Random oracles are practical: A paradigm for designing efficient protocols", Proc. 1st ACM Conference on Computer and Communications Security, 1993. using a secure hash function. In this case, the public-key encryption scheme and the pseudo-random functions for circuit encryption can be implemented with discrete logarithms based on the hardness of the Diffie-Ηellman problem, as described by M. Naor and O. Reingold in "Number-theoretic constructions of efficient pseudo-random functions", Proc. 38th IEEE Symposium on Foundations of Computer Science (FOCS), 1997.
h the following, an extension of the above-described method is disclosed in order to achieve a general mobile computing scheme with multiple entities H_, ..., Hh as indicated in Fig. 1. The generalization is the natural one in which each entity executes steps 2) to 4) of the basic scheme above and sends the agent to the next entity afterwards.
Thereby, the code originator O prepares one encrypted circuit G for each entity Hi, ..., Hi and incorporates the encrypted state xs. \ from ^Hnto C® foτj > 1. This is achieved by using the output keys Uι , ..., Un ~ 'ftom Cϋ-1) for decrypting a hidden representation of the inputs to
In a symmetric cryptosystem with encryption and decryption operations under key k denoted by Eic(-) and Dk(-), respectively, the cryptosystem includes sufficient redundancy such that given a potential key U and a ciphertext c one can determine with high probability whether c results from an encryption under U. The modifications to the scheme are as follows.
la) The code originator O obtains Cω, , X , Um, and Iω, for; = 1, ..., I in the same way as for 6 above. However, the code originator O selects the values E- = E! Λ..(1) only for (?(1). The identifier in thej'th stage is set to id )| j. The code originator O also prepares two encryptions
Figure imgf000017_0001
for each j > 1 and i = 1, ..., nx , and randomly permutes them before assigning them to v 0 and VJjj ;call the list of such pairs V .
Then, the code originator O sends
id, E'j , ..., Ln'χ, Gm, 1(1 , Uz m and (?», 1®, Kz ω, ^ ω for; = 2, ..., /
to the first entity Hi within a single message.
2a) Forj* > 1, when Hj runs step 2 of the basic scheme, is receives V and Ε/j , ..., C/^_1) from H/_ i, which has before evaluated (?ϋ_1).
Each entity interprets each £/,• as a symmetric key to E, determines which one of the ciphertexts V®0 and V®t it decrypts, and then decrypts the one that matches. This yields K. , an oblivious representation of the tth bit in the current state xj of the agent. Those keys are then used to evaluate C .
3a) When Hj has obtained its output from evaluating C®, it forwards all data that it has received from Hj . together with if , ..., Unx to Hy + i . At the end of the circle, H returns if to the code originator O.
The computation entity T generates the code
In a variation where the roles of O and T are switched, the computation entity T generates the encrypted circuit. Because it is trusted to follow the protocol one does not have to add a costly zero-knowledge proof for correctness of the whole circuit. Therefore, the operations of the other entities and the corresponding proofs ensuring robustness become much simpler. The computation entity T has to know g and h for constructing the circuit, but it may obtain a description of C from O in a first protocol message.
A three-party oblivious transfer protocol is used, as introduced by M. Naor, B. Pinkas, and R. Sumner in "Privacy preserving auctions and mechanism design", Proc. 1st ACM Conference on Electronic Commerce, 1999, in which the role of the chooser is separated among the chooser and a third party, called the receiver. Compared to the standard notion of oblivious transfer, the receiver gets the output message σspecified by the chooser, who itself learns nothing. This so-called "proxy" oblivious transfer can be realized using three message flows: from chooser to receiver and from receiver to sender and back.
The protocol uses also a one-round implementation of standard oblivious transfer between two parties, which can be realized using the method of C. Cachin, J. Camenisch, J. Kilian, and J. Mϋller, published in their article "One-round secure computation and secure autonomous mobile agents", at Proc. 27th International Colloquium on Automata, Languages and Programming (ICALP) (U. Montanari, J. P. Rolim, and E. Welzl, eds.), Lecture Notes in Computer Science, vol. 1853, Springer, July 2000, pp. 512-523.
As in the basic scheme the component of a encrypted circuit construction is applied. The protocol is described for the basic case of mobile code with a single entity H. Suppose O employs a public-key encryption scheme with encryption and decryption operations denoted by E (-) and Do(-), respectively. O starts the computation as the chooser in nx parallel three-party oblivious transfers, one for each bit of x. It sends these hidden choices to H, who acts as the receiver in the three-party oblivious transfers, together with C and Eo(-). H forwards the appropriate data to T, who acts as the sender; it will send the key pairs E in the three-party oblivious transfer. Furthermore, H also prepares its input to ny parallel one-round oblivious transfers (playing the role of the chooser), one for each bit of y. It sends these to T, together with the descriptions of C and Eo(-)', T will send the key pairs K in the one-round oblivious transfers.
T invokes construct(Q to obtain 6 and the key pairs £ , X , and U . It replies to H withEoC ^), G, Uz and the final flows in all oblivious transfer protocols.
From this, H can determine the keys L , ...,Ln'χ representing x and the keys K , ...,Ln' representing y. It runs evάluate( (7 , L , ...,L„! x,K , ...,K'ny) to obtain U , ..., U'llχ+nzas above. Then it determines its output z from Un'χ+1, ..., U„'x+nzand from Uz, and it forwards U\, ..., Un'χ together with E0(Ux)to O. This enables O to obtain its output ξ. The following shows an extension of the protocol from a single host or first entity Hi to / hosts Hi, ..., Hi. The protocol starts as before for the first host. However, the steps for H2, ..., Hi are slightly different: three-party oblivious transfer and encryption under Eo are not used. Instead, T encrypts the keys ® in the input of Cω and representing the state xj-ι of the agent under the output keys in li^> from G^ as before V®. The keys lt°'_1) can be stored by T between step j - 1 and step j or they can be sent along with the protocol flow and are transmitted to T via Hj . i and Hj, whereby they are encrypted byEr(-)- h addition, the last host obtains Ux encrypted with Eo(-) from T and forwards this to O as above.
The communication pattern is the same as in the basic scheme: there is one message from O to Hi, one from each Hj . i to Hj and one from to O, plus one communication flow between each host and the computation entity T. Robustness can be added by using non-malleable public-key encryption schemes and non-interactive zero-knowledge proofs. However, the result will be much more practical because zero-knowledge proofs are not needed for the potentially large encrypted circuit. Moreover, the encrypted circuit construction can be implemented by a block cipher instead of public-key operations.
Any disclosed embodiment may be combined with one or several of the other embodiments shown and/or described. This is also possible for one or more features of the embodiments.
The present invention can be realized in hardware, software, or a combination of hardware and software. Any kind of computer system - or other apparatus adapted for carrying out the method described herein - is suited. A typical combination of hardware and software could be a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein. The present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which - when loaded in a computer system - is able to carry out these methods.
Computer program means or computer program in the present context mean any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following a) conversion to another language, code or notation; b) reproduction in a different material form.

Claims

1. A method for processing an originator request (OR) of a customer (O) sendable to at least one first entity (H), the method comprising:
a) sending from said customer (O) said originator request (OR) to the or each first entity
( );
b) connecting the or each first entity (H) to a computation entity (T);
c) adding by the or each first entity (H), on receipt of the originator request (OR), information (I) concerning said originator request (OR) thereby forming a first-modified request (FMR);
d) sending at least part of said first-modified request (FMR) to at least said computation entity (T);
e) having received at least part of said first-modified request (FMR) by said computation entity (T) deriving a computation-entity result (CER) from said at least part of said first-modified request (FMR);
f) sending at least part of said computation-entity result (CER) to the or each first entity (H);
g) having received at least part of said computation-entity result (CER) by the or each first entity (H) deriving therefrom a first-entity result (EER) and forwarding it at least in part; and
h) having received at least part of said first-entity result (EER) by said customer (O) deriving therefrom a customer result (CR).
2. A method for processing an originator request (OR) of a customer (O) by a vendor (H), the method comprising:
a) receiving from said customer (O) said originator request (OR) and adding information (I) concerning said originator request thereby forming a first-modified request (FMR);
b) sending at least part of said first-modified request (FMR) to at least a computation entity (T) that derives a computation-entity result (CER) therefrom and returns it at least in part; and
c) having received at least part of said computation-entity result (CER) by said first entity (H) deriving therefrom a first-entity result (EER) and forwarding it at least in part, whereby said customer (O) is able to derive a customer result (CR) from said at least part of said first-entity result (EER).
3. A method for processing a first-modified request (FMR) from at least one first entity (H) comprising at least part of an originator request (OR) from a customer (O) by a computation entity (T), the method comprising:
a) receiving said first-modified request (FMR) from the or each first entity (H);
b) deriving a computation-entity result (CER) from at least part of said first-modified request (FMR);
c) sending at least part of said computation-entity result (CER) to the or each first entity (H) that derives therefrom a first-entity result (EER) and forwards it at least in part, whereby said customer (O) is able to derive a customer result (CR) from said at least part of said first-entity result (EER).
4. A method for processing an originator request (OR), the method comprising:
a) forming said originator request (OR);
b) sending said originator request (OR) to at least one first entity (H), whereby the or each first entity (H) adds its information (I) concerning said originator request (OR) thereby forming a first-modified request (FMR), and sends at least part of said first-modified request (FMR), to at least a computation entity (T) that derives therefrom a computation-entity result (CER), at least part of said computation-entity result (CER) being sent to the or each first entity (H) that derives therefrom a first-entity result (EER), and forwards it at least in part, and
c) having received said at least part of said first-entity result (EER) deriving therefrom a customer result (CR).
5. The method according to one of the preceding claims, further comprising the step of applying a cryptographic operation to the requests (OR, FMR) and results (CER, EER).
6. The method according to claim 4, whereby the step of forming the originator request (OR) comprises applying an encrypted circuit construction (G).
1. A computer program element comprising program code means for performing a method of any one of the claims 1 to 6 when said program is run on a computer.
8. A computer program product stored on a computer usable medium, comprising computer readable program means for causing a computer to perform a method according to anyone of the preceding claims 1 to 6.
9. A system for processing an originator request (OR), comprising:
a customer (O) connected to at least one first entity (H); and
a computation entity (T) connected to at least said first entity (H);
wherein said customer (O) sends said originator request (OR) to the or each first entity
(H) that adds information (I) concerning said originator request (OR) thereby forming a first-modified request (FMR) and sends at least part of said first-modified request (FMR) to at least said computation entity (T), said computation entity (T) derives a computation-entity result (CER) from said at least part of said first-modified request (FMR) and sends at least part of said computation-entity result (CER) to the or each first entity (H), the or each first entity (H) derives a first-entity result (EER) from said at least part of said computation-entity result (CER) and forwards it at least in part,
said customer (O) being able to derive a customer result (CR) from said at least part of said first-entity result (EER).
10. The system according to claim 9, wherein the originator request (OR) comprises a function in encrypted form.
11. The system according to claim 10, wherein the function in encrypted form comprises an encrypted circuit construction (G).
12. The system according to claim 9, wherein the originator request (OR) is part of a mobile code.
13. The system according to claim 9, wherein the originator request (OR), the first-modified request (FMR), the computation-entity result (CER), and the first-entity result (EER) comprise an encrypted part.
14. The system according to any of the preceding claims 9 to 13, wherein the originator request (OR) comprises one or more information of: an offer, a customer information, a purchase information.
15. The system according to claim 9, wherein the first entity (H) comprises a web server offering a service and/or a customer information concerning acceptance of the originator request (OR).
16. The system according to claim 9, wherein the customer result (CR) comprises a first-entity information concerning acceptance of the originator request (OR).
* * *
PCT/IB2001/001988 2000-11-06 2001-10-24 Method and system for processing a request of a customer WO2002037242A2 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
IL15539401A IL155394A0 (en) 2000-11-06 2001-10-24 Method and system for processing a request of a customer
CA002426794A CA2426794C (en) 2000-11-06 2001-10-24 Method and system for processing a request of a customer
KR1020037006030A KR100582393B1 (en) 2000-11-06 2001-10-24 Method and system for processing a request of a customer
JP2002539930A JP4336105B2 (en) 2000-11-06 2001-10-24 Method and system for processing customer requests
EP01978722A EP1368721A2 (en) 2000-11-06 2001-10-24 Method and system for processing a request of a customer
AU2002210814A AU2002210814A1 (en) 2000-11-06 2001-10-24 Method and system for processing a request of a customer

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP00124061.3 2000-11-06
EP00124061 2000-11-06

Publications (2)

Publication Number Publication Date
WO2002037242A2 true WO2002037242A2 (en) 2002-05-10
WO2002037242A3 WO2002037242A3 (en) 2003-10-16

Family

ID=8170289

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2001/001988 WO2002037242A2 (en) 2000-11-06 2001-10-24 Method and system for processing a request of a customer

Country Status (8)

Country Link
EP (1) EP1368721A2 (en)
JP (1) JP4336105B2 (en)
KR (1) KR100582393B1 (en)
CN (1) CN1478222A (en)
AU (1) AU2002210814A1 (en)
CA (1) CA2426794C (en)
IL (1) IL155394A0 (en)
WO (1) WO2002037242A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102007001519A1 (en) * 2007-01-10 2008-07-17 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Concept for allocating data rates to information signal providers in a network
US8838950B2 (en) 2003-06-23 2014-09-16 International Business Machines Corporation Security architecture for system on chip

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1305261C (en) * 2005-02-04 2007-03-14 南京邮电学院 A mobile proxy safeguarding method similar to biological self-protection

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6026374A (en) * 1996-05-30 2000-02-15 International Business Machines Corporation System and method for generating trusted descriptions of information products

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6026374A (en) * 1996-05-30 2000-02-15 International Business Machines Corporation System and method for generating trusted descriptions of information products

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
CACHIN C., CAMENISCH J., KILIAN J., MÜLLER J.: "One-Round Secure Computation and Secure Autonomous Mobile Agents" LECTURE NOTES IN COMPUTER SCIENCE, [Online] vol. 1853, 9 - 15 July 2000, pages 512-523, XP002240276 Retrieved from the Internet: <URL:http://cui.unige.ch/~icapl> [retrieved on 2003-05-07] *
CACHIN C: "EFFICIENT PRIVATE BIDDING AND AUCTIONS WITH AN OBLIVIOUS THIRD PARTY" 6TH. ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY. SINGAPORE, NOV. 2 - 4, 1999, ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, NEW YORK, NY: ACM, US, 2 November 1999 (1999-11-02), pages 120-127, XP001054529 ISBN: 1-58113-148-8 *
SANDHOLM T., HUAI Q.: "Nomad: Mobile Agent System for an Internet-Based Auction House" IEEE INTERNET COMPUTING, 1 March 2000 (2000-03-01) - 30 April 2000 (2000-04-30), pages 80-86, XP002240277 *
WILHELM U. G., STAAMANN S. M., BUTTYÁN L.: "A Pessimistic Approach to Trust in Mobile Agent Platforms" IEEE INTERNET COMPUTING, 1 September 2000 (2000-09-01) - 30 October 2000 (2000-10-30), pages 40-48, XP002240278 *
WILHELM U. G.,STAAMANN S.,BUTTYÁN L.: "Introducing Trusted Third Parties to the Mobile Agent Paradigm" SECURE INTERNET PROGRAMMING, 1999, pages 471-489, XP001147911 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8838950B2 (en) 2003-06-23 2014-09-16 International Business Machines Corporation Security architecture for system on chip
DE102007001519A1 (en) * 2007-01-10 2008-07-17 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Concept for allocating data rates to information signal providers in a network
DE102007001519B4 (en) * 2007-01-10 2015-08-20 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Concept for allocating data rates to information signal providers in a network

Also Published As

Publication number Publication date
WO2002037242A3 (en) 2003-10-16
CA2426794A1 (en) 2002-05-10
KR20030072348A (en) 2003-09-13
IL155394A0 (en) 2003-11-23
AU2002210814A1 (en) 2002-05-15
CN1478222A (en) 2004-02-25
JP4336105B2 (en) 2009-09-30
EP1368721A2 (en) 2003-12-10
JP2004513542A (en) 2004-04-30
CA2426794C (en) 2009-10-06
KR100582393B1 (en) 2006-05-22

Similar Documents

Publication Publication Date Title
Algesheimer et al. Cryptographic security for mobile code
US6834272B1 (en) Privacy preserving negotiation and computation
Naor et al. Privacy preserving auctions and mechanism design
EP0876722B1 (en) Secure anonymous information exchange in a network
Cachin Efficient private bidding and auctions with an oblivious third party
Skudnov Bitcoin clients
US8117456B2 (en) Network system, server and information terminal for list matching
Tate et al. Mobile Agent Security Through Multi-Agent Cryptographic Protocols.
Tewari et al. Fully anonymous transferable ecash
Devidas et al. Identity verifiable ring signature scheme for privacy protection in blockchain
Karjoth Secure mobile agent-based merchant brokering in distributed marketplaces
US7844496B2 (en) Method and system for processing a request of a customer
CA2426794C (en) Method and system for processing a request of a customer
Yi et al. A secure agent-based framework for internet trading in mobile computing environments
US11538070B2 (en) Blockchain-based system and method for peer-to-peer online advertising auction
CN114565382A (en) Transaction account anonymous payment method and system
Pang et al. A secure agent-mediated payment protocol
Far et al. Goodbye Bitcoin: A general framework for migrating to quantum-secure cryptocurrencies
Singelée et al. Secure e-commerce using mobile agents on untrusted hosts
Hsu et al. Scalable m+ 1st-price auction with infinite bidding price
Yi et al. Secure agent-mediated online auction framework
Aïmeur et al. Blind sales in electronic commerce
Fan et al. Fair transaction protocols based on electronic cash
Hsu et al. Blockchain based M+ 1st-Price Auction with Exponential Bid Upper Bound
Jaiswal et al. Security model for a multi-agent marketplace

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 155394

Country of ref document: IL

WWE Wipo information: entry into national phase

Ref document number: 2426794

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 01818247X

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 1020037006030

Country of ref document: KR

WWE Wipo information: entry into national phase

Ref document number: 2002539930

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 2001978722

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 836/DELNP/2003

Country of ref document: IN

WWP Wipo information: published in national office

Ref document number: 1020037006030

Country of ref document: KR

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 2001978722

Country of ref document: EP

WWG Wipo information: grant in national office

Ref document number: 1020037006030

Country of ref document: KR