期刊文献+

一种可信计算环境下DAA协议实现方案 被引量:2

Implementation of Direct Anonymous Attestation Scheme Based on Trusted Platform Module
原文传递
导出
摘要 证明是可信计算从体系结构上保障网络服务安全的重要功能。文中介绍了TCG可信计算环境下的认证策略和以TPM为基础的直接匿名认证协议(Direct Anonymous Attestation,DAA),分析了其特点,提出为了获得更好的应用性,对DAA协议进行基于ECC算法的扩展方案。经安全性分析证明,该方案在可信计算环境下只需有限的系统资源,可以有效提高可信网络接入的安全性与可管可控性。 Attestation is an important component of trusted computation to protect Web services security. This paper analyzes the Direct Anony/nous Attestation(DAA) adopted by the Trusted Computation Group(TCG) on the trusted computing platform and points out its advantage and disadvantage. It gives an extended DAA scheme based ECC for better application. The security analysis proves that the protocol with limited system resources could effectively enhance the trustgd network access control security and controllability in trusted computing environments.
出处 《信息安全与通信保密》 2009年第11期76-78,共3页 Information Security and Communications Privacy
基金 国家863项目资助(基金号:2007AA01Z457) 国家大学生创新性实验计划项目资助(基金号:ITP028)
关键词 可信计算 认证协议 隐私 ECC trusted computation platform strategy of attestation privacy ECC
  • 相关文献

参考文献4

二级参考文献44

  • 1侯方勇,周进,王志英,刘真,刘芸.可信计算研究[J].计算机应用研究,2004,21(12):1-4. 被引量:28
  • 2张永,方滨兴,包秀国.网络可生存性研究概述[J].计算机工程与应用,2005,41(7):119-121. 被引量:8
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4王新成.可信计算与系统安全芯片[J].计算机安全,2005(10):2-6. 被引量:5
  • 5李娜.可信计算与内网安全[J].计算机安全,2005(10):7-9. 被引量:4
  • 6[1]TCG Specification Architecture Overview Specification,Re-vision 1.2[EB/OL].http://www.trustedcomputinggroup.org.
  • 7[2]TCG PC Client Specific Implementation Specification For Conventional BIOS[EB/OL].https://www.trusted computing group.org/groups/pcclient/.
  • 8[3]Duane De Capite,Self-Defending Networks:The Next Generation of Network Security,August 31,2006.
  • 9[4]TCG Trusted Network Connect TNC Architecture for Interoperability Specification,Version 1.1,Revision 2,1 May 2006.
  • 10Nyberg K, Rueppel R A. Message Recovery for Signature Schemes Based on the Discrete Logarithm[A]. Advances in Cryptology-EUROCRYPT'94[C]. 1994. 175-190.

共引文献96

同被引文献16

  • 1李洁,吴振强,于璐,孙鹏,程瑶.一种改进的直接匿名认证方案[J].计算机应用,2009,29(2):364-366. 被引量:7
  • 2赵泽茂,吴远高,刘凤玉.基于椭圆曲线的具有消息恢复的签名方案[J].计算机工程与科学,2005,27(2):3-4. 被引量:13
  • 3CHEN Li-qun, MORRISSEY P, SMART N P. Pairings in trusted computing[ C ]//Proc of the 2nd International Conference on Pairingbased Cryptography. Berlin : Springer-Verlag, 2008 : 1 - 17.
  • 4GE He, TATE S R. A direct anonymous attestation scheme for embedded devices[ C]//Proc of the 10th International Conference on Practice and Theory in Public-key : Springer-Verlag,2007 : 16-30.
  • 5Trusted Computing Group. Trusted computing platform alliance (TCPA) main specification version1.1b [ EB/OL]. (2002-02-22). http://www. trusted computing group. org.
  • 6Trusted Computing Group. TPM specification version 1.2 [ EB/OL]. (2006-03-29). http://www. trusted computing group. org.
  • 7BRICKELL E, CHEN L, LI J. A new direct anonymous attestation scheme from bilinear maps [ C ]//Proc of the 1 st International Conference on Trusted Computing and Tpust in Information Technologies. Berlin : Springer-Verlag,2008 : 166-178.
  • 8曹春杰,杨超,马建峰,朱建明.WLAN Mesh漫游接入认证协议[J].计算机研究与发展,2009,46(7):1102-1109. 被引量:15
  • 9刘吉强,赵佳,赵勇.可信计算中远程自动匿名证明的研究[J].计算机学报,2009,32(7):1304-1310. 被引量:18
  • 10朱紫钊,姚国祥.基于离散对数的数字签名方案[J].计算机应用,2009,29(9):2342-2343. 被引量:4

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部