期刊文献+

一个基于身份的可信平台远程证明方案 被引量:1

A Remote Attestation Scheme for the ID-Based Trusted Platform
下载PDF
导出
摘要 可信计算已经从前几年的大造舆论、广泛宣传,转入到实现阶段。但是当前可信计算还存在一些问题需要解决,比如可信计算平台远程证明(以下简称远程证明)的实现。首先说明了基于PKI的远程证明存在的问题,然后针对这些问题,提出基于身份的远程证明方案。对新方案的优点和缺点进行了详细的分析,并设计了一个基于身份的远程证明协议,然后使用模型检测工具SPIN对其进行了形式化分析。 Although Trusted Computing(TC) has been in the realization phase,there are still some problems including the realization of remote attestation.We first discuss the problems for the PKI-based remote attestation,and propose a new solution in which the remote attestation is based on the IBE.We also analyze the advantages and disadvantages of this solution in detail,and design a new protocol for the IBE-based remote attestation.Finally,the model checker tool SPIN is utilized to validate this protocol.
出处 《中国电子科学研究院学报》 2010年第3期286-290,共5页 Journal of China Academy of Electronics and Information Technology
基金 可信计算中基于标识的安全认证机制研究(国家863计划)(2008AA01Z405)
关键词 远程证明 基于身份 安全协议 remote attestation identity based security protocol
  • 相关文献

参考文献6

  • 1郝平,何恩.可信计算的安全防护机制及其在高可信网络中的应用[J].中国电子科学研究院学报,2008,3(1):14-19. 被引量:4
  • 2朱宜炳,罗敏.典型安全协议形式化分析工具比较[J].计算机与现代化,2008(5):86-89. 被引量:2
  • 3SHANE BALFE, EIMEAR GALLERY, et al. Challengesfor Trusted Computing[ R]. Information Security Group, Royal Hollo-way, University of London, 2008.
  • 4拾以娟.基于身份的公钥密码学关键问题研究[D].上海:上海交通大学博士学位论文,2006.
  • 5CHA J, CHEON. J An Identity-based Signature from Diffie Hellman Groups [ C]. Public Key Cryptography Proceed-ings of PKC 2003, LNCS 2567, Y. Desmedt ed. , 2003.
  • 6HOIZMANN J G. The Model Checker SPIN[J]. IEEE Transa-ction on Software Engineering, 1997,23 (5) : 76- 95.

二级参考文献22

  • 1沈昌祥.坚持自主创新 加速发展可信计算[J].计算机安全,2006(6):2-4. 被引量:17
  • 2[1]National Science Foundation.Global Environment for Network Innovations[EB/OL].[20cr7-03-23].http://www.nsf.gov/cise/geni.
  • 3[2]National Science Foundation.Future Internet Network Design[EB/OL].[2007-03-23].http://find.isi.edu/.
  • 4[3]Trusted Computing Group.TCG Specification Architecturre Overview[EB/OL].[2007-07-10].http://www.trustedcomputinggroup.org.
  • 5[4]Trusted Computing Group.TCG PC Specific Implementation[EB/OL].[2007-07-10].http://www.trustedcomputinggroup.org.
  • 6[5]Microsoft Corp.NGSCB:Trusted Computing Base and Software Authentication[EB/OL].[2007-03-23].http://www.microsoft.com/resources/ngseb/documenta/ngscb_tcb.doc.
  • 7[6]Duane De Capite.Self-Defending Networks:The Next Generation of Network Security[M].Indianapolis:Cisco Press,2006.
  • 8[7]JIANPING WU,JUN BI,et al.An End-to-end Source Address Validation Solution for IPv6[EB/OL].[2007-08-20].http://www.ietf.org.
  • 9[9]Trusted Computing Group.TCG Trusted Network Connect TNC Architecture for Interoperability[EB/OL].[2007-07-10].http://www.tmstedcomputinggroup.org.
  • 10Dolev D,Yao A C. On the security of public key protocols [ C]//Proceedings of the IEEE 22nd Annual Symposium on Foundations of Computer Science, 1981:350-357.

共引文献4

同被引文献9

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部