期刊文献+

基于Merkle树的远程证明机制

Remote attestation scheme based on Merkle tree
原文传递
导出
摘要 针对生产控制环境中设备状态的可信验证问题,提出了一种远程证明方案.采用与管理中心协商策略,由设备平台上的可信平台模块定时地对设备平台运行状态进行完整性度量和评估,并生成完整性报告.为保证报告结果的新鲜性和完整性,在设备平台引入时间戳及Merkle树相结合的随机数方法,并保证报告结果的有效性.最后,对该方案的安全性和效率进行了分析. A remote attestation scheme was proposed to make device's report its integrity status actively.According to the policy negotiated between control center and devices,the devices measured and evaluated their runtime integrity status automatically and generated integrity reports periodically with the aid of trusted platform module (TPM).Time stamp and Merkle tree organized nonces were introduced to ensure the freshness,integrity and availability of the reports.The security and efficiency of the scheme were also analyzed.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第4期50-53,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家高技术研究发展计划资助项目(2007AA01Z429 2007AA01Z405) 国家自然科学基金重点研究计划资助项目(60633020) 河南省自然科学基金资助项目(092300410219)
关键词 完整性评估 哈希函数 远程证明 可信计算 MERKLE树 integrity evaluations hash function remote attestation trusted computing Merkle tree
  • 相关文献

参考文献11

  • 1Trusted Computing Group. TCG specification architecture overview[EB/OL]. [2008-12-08-]. https:/// www. trustedeomputinggroup, org/groups/TCG- 1- 0 Architecture Overview. pdf.
  • 2Trusted Computing Group. TPM main part 1 design principles[EB/OL]. [-008-11-01]. https://www.trustedcomputinggroup, org/specs/TPM/tpmwgmainrev62_ Part1 Design- Principles. pdf.
  • 3Merkle R. A certified digital signature[C] //Advances in Cryptology-CRYPTO'89. Berlin.. Springer- Verlag, 1989: 218-238.
  • 4Sailer R, Zhang X, Jaeger T, et al. Design and implementation of a TCG-based integrity measurement architecture[C]//Proceedings of the 13th USENIX Security Symposium. Sa Diego California: ACM Press, 2004: 223-238.
  • 5Schellekens D, Wyseur B, Preneel B. Remote attestation on legacy operating systems with trusted platform modules [J]. Electronic Notes in Theoretical Computer Science (ENTCS), 2008, 197(1): 59-72.
  • 6Stumpf F, Fuchs A, Katzenbeisser S, et al. Improving the scalability of platform attestation[C]//I Proceedings of the 3rd ACM workshop on Scalable Trusted Computing. Fairfax, VA: ACM, 2008: 1-10.
  • 7徐国愚,常朝稳,黄坚,谷冬冬.基于时间的平台完整性证明[J].计算机工程,2009,35(6):153-155. 被引量:5
  • 8谭运猛,郎为民,杨宗凯.基于Merkle树的微支付方案[J].华中科技大学学报(自然科学版),2004,32(6):27-28. 被引量:4
  • 9Chang C, He R, Xie H, et al. A high efficiency protocol for reporting integrity measurements[C]//Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications. Kaohsiung: IEEE Press, 2008: 358-362.
  • 10蔡永泉,刘芳.DMSS-动态Merkle可信树签名方案[J].电子学报,2009,37(B04):97-101. 被引量:4

二级参考文献16

  • 1Norio Adachi, Satoshi Aoki, Yuichi Komano, et al.The security problems of rivest and shamir's PayWord scheme. In: Lingas A, Karlsson R, Carlsson S, eds.Proc. IEEE International Conference on E-Commerce (CEC'03). Berlin: Springer-Verlag, 2003. 157~161
  • 2Rivest R L, Shamir A. PayWord and microMint: two simple micropayment schemes. In: Lomas M, ed. Security Protocols-International Workshop. Berlin:Springer-Verlag, 1997. 69~87
  • 3Merkle R. A certified digital signature. In: Stinson D,ed. Proc. Advances in Cryptology-CRYPTO' 89.Berlin: Springer-Verlag, 1990. 218~238
  • 4Sailer R, Zhang Xiaolan, Jaeger T, et al. Design and Implementation of a TCG-based Integrity Measurement Architecture[C]//Proc. of the 13th Usenix Security Symposium. San Diego, USA: [s. n.], 2004.
  • 5Sandhu R, Zhang Xinwen. Peer-to-Peer Access Control Architecture Using Trusted Computing Technology[C]//Proc. of the ACM Symp. on Access Control Models and Technology. [S.l.]: ACM Press, 2005.
  • 6Sastry M R, Wiseman W M. Method for Providing Integrity Measurements with Their Respective Time Stamps: USA, 2006/0074600 A 1 [P]. [2008-03-12].
  • 7Trusted Computing Group. TCG TPM Specification Version 1.2, Revision 103(Design Principles, Structures of the TPM, and Commands)[EB/OL]. (2007-07-09). https://www.trustedcomputing group.org/specs/TPML.
  • 8Ralph C Merkle. A certified digital signature[ A]. Advances in Cryptology-CRYPTO' 89 [ C ]. Berlin: Springer-Vedag, 1989. 218 - 238.
  • 9R L Rivest,A Shamir, L Adleman. A method for obtaining digital signatures and public-key cryptosystems[J]. New York: Communications of the ACM, 1978,21 (2) : 120 - 126.
  • 10T Elgamal. A aublic key cryptosystem and a signature scheme based on discrete logarithms [ A ]. Advances in Cryptology- CRYPTO' 89[ C]. Berlin: Springer-Verlag, 1985.10 - 18.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部