期刊文献+

A Method to Implement Full Anonymous Attestation for Trusted Computing Platform 被引量:3

A Method to Implement Full Anonymous Attestation for Trusted Computing Platform
下载PDF
导出
摘要 Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity. Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity.
机构地区 School of Electronic
出处 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期101-104,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National High Technology Research and Development Program of China (2005AA145110)
关键词 trusted computing trusted platform module direct anonymous attestation trusted computing trusted platform module direct anonymous attestation
  • 相关文献

参考文献8

  • 1Vaughan-Nichols S J.How Trustworthy is Trusted Computing[].Computer.2003
  • 2Reid J,Nieto J M G,Dawson E, et al.Privacy and Trusted Computing[].Proceedings of the th International Workshop on Database and Expert Systems Applications.2003
  • 3Trusted Computing Group.TCG TPM Specification Version 1.2. http://trustedcomputinggroup.org . 2005
  • 4Brickell E,Camenisch J,Chen L.Direct Anonymous Attestation[].Proceedings of th ACM Conference on Computer and Communications Security.2004
  • 5Trusted Computing Group.TCG TPM Specification 1.2 Changes Overview[].https://www trustedcomputinggrouporg/groups/tpm.2003
  • 6Ge H,Liu L.A Method to Implement Direct Anonymous Attestation. http://www.iacr.org/2006/ 023.ps.gz . 2006
  • 7Felten E W.Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?[].IEEE Security and Privacy.2003
  • 8Balfe S,Lakhani A D,Paterson K G.Trusted Computing: Providing Security for Peer-to-Peer Networks[].Proceedings of the th IEEE International Conference on Peer-to-Peer Computing.2005

同被引文献25

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部