期刊文献+

一种多信任域内的直接匿名证明方案 被引量:24

A Direct Anonymous Attestation Scheme in Multi-Domain Environment
下载PDF
导出
摘要 针对可信计算平台的原始直接匿名证明方案在多信任域的环境下存在的不足,提出了一种多信任域内的直接匿名证明方案.该方案扩展了原始的直接匿名证明方案,解决了可信计算平台在多信任域内的隐私性保护问题.利用理想系统/现实系统模型对该方案进行了安全性的分析和证明.分析表明,该方案满足匿名性和不可伪造性.最后分析方案的计算性能,实验验证了方案的有效性和可行性. In this paper, the authors analyze the direct anonymous scheme for trusted computing platform and find the deficiency of direct anonymous scheme in multi-domain environments. Then, the authors extend the direct anonymous scheme so that the new scheme can be suitable for multi-domain environment. The new scheme can protect the privacy of trusted computing platform in multi-domain environment, meanwhile the authors analyze the security aspects of the proposed scheme, it is showed that the scheme meet the security requirements of unforgeability and anonymity, finally the authors analyze the efficiency of the proposed scheme and validate the proposed scheme through the experiments.
出处 《计算机学报》 EI CSCD 北大核心 2008年第7期1122-1130,共9页 Chinese Journal of Computers
基金 国家自然科学基金项目(60673083,60603017) 国家“八六三”高技术研究发展计划项目基金(2007AA01Z412,2006AA01Z454)资助
关键词 可信计算平台 直接匿名证明 多信任域 可信平台模块 trusted computing platform direct anonymous attestation multi-domain environment trusted platform module
  • 相关文献

参考文献8

  • 1Brickell Ernest F, Camenisch Jan, Chen Li-Qun. Direct anonymous attestation//Proceedings of the ACM Conference on Computer and Communications Security. Washington, DC, 2004, 132-145.
  • 2Camenisch J, Stadler M. Efficient group signature schemes for large groups//Kaliski B eds. Advances in Cryptology- CRYPTO'97. LNCS 1296. Springer Verlag, 1997:410-424.
  • 3Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems//Proceedings of the CRYPTO'86. LNCS 263. Springer Verlag, 1986. 186-194.
  • 4Chase M, Anna Lysyanskaya. On signatures of knowledge// Advances in Cryptology- CRYPTO 2006. Santa Barbara, California, USA, 2006.
  • 5Camenisch J, Lysyanskaya A. A signature scheme with efficient protocols//Proceedings of the SCN 2002. LNCS 2576. Springer Verlag, 2003:268-289.
  • 6Canetti R. Studies in secure multiparty computation and applications[Ph. D. dissertation]. Weizmann Institute of Science, Rehovot 76100, Israel, 1995.
  • 7Pfitzmann B, Waidner M. Composition and integrity preservation of secure reactive systems//Proceedings of the 7th ACM Conference on Computer and Communications Security. Athens, Greece, 2000: 245-254.
  • 8Menezes A J, Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. CRC Press, Inc, 1997:613-619.

同被引文献276

引证文献24

二级引证文献185

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部