期刊文献+

基于可信芯片的终端平台匿名身份建立方法研究 被引量:5

Research of Platform Anonymous Identity Management Based on Trusted Chip
下载PDF
导出
摘要 文章针对当前基于隐私CA(Privacy CA)的平台身份建立方案和DAA(直接匿名证明)方案应用于网络终端平台身份管理时存在的两个问题:EK(Endorsement Key)证书管理复杂以及与传统基于管理员身份的终端管理方案未有效结合,无法支持基于管理员的平台身份撤销,提出了改进的基于可信芯片的网络终端平台身份管理方案.该方案包括平台EK产生、平台匿名身份建立、身份撤销、身份认证时的安全协议定义,利用了零知识证明以及基于ID的加密机制,有效解决了上述问题.同时在随机预言机模型下,作者还给出了该方案的正确性、匿名性以及不可伪造性的安全性证明. TPM/TCM-Based platform identity management is the base to construct TNC (trusted network connect). However there are two problems when managing platform identity of the network terminals using privacy-CA and DAA (direct anonymous attestation) approaches. The first one is that it is hard to manage EK certificate of TPM/TCM, especially in large scale networks. Secondly traditional administrator-based terminal management can not be combined with the approaches based on TPM/TCM. The paper proposes an improved approach to manage termi- nal platform identity based on TPM/TCM. It defines the protocols to issue EK, establish platform anonymous identity, revoke platform identity, and authenticate platform identity. Moreover the security of this approach is proven under RO (random oracle) model.
出处 《计算机学报》 EI CSCD 北大核心 2010年第9期1703-1712,共10页 Chinese Journal of Computers
基金 国家科技支撑计划(2008BAH22B06) 国家"八六三"高技术研究发展计划项目基金(2007AA01Z412) 中国科学院知识创新工程领域前沿项目(ISCAS2009-DR14 ISCAS2009-GR)资助~~
关键词 TPM/TCM 平台匿名身份 可信网络连接 TPM/TCM platform anonymous identity trusted network connect
  • 相关文献

参考文献19

  • 1Trusted Computing Group.TCG Specification Architecture Overview v1.2,2004.
  • 2中国国家密码管理局.可信计算密码支撑平台功能与接口规范.2007年12月
  • 3Brickell Ernie,Camenisch Jan,Chen Li-Qun.Direct anonymous attestation//Proeeedings of the ACM Conference on Computer and Communications Security.Washington DC,USA,2004:132-145.
  • 4Ge He,Tate Stephen R.A direct anonymous attestation scheme for embedded devices//Okamoto Tatsuaki,Wang Xiaoyun.Public Key Cryptography.Berlin:Springer,2007:16-30.
  • 5Brickell Ernie,Li Jiang-Tao.Enhanced privacy ID:A direct anonymous attestation scheme with enhanced revocation capabilities//Proceedings of the 2007 ACM Workshop on Pri-vacy in Electronic Society.Alexandria,Virginia,USA,2007:21-30.
  • 6Brickell Ernie,Chen Li-Qun,Li Jiang-Tao.A new direct anonymous attestation scheme from Bilinear Maps// Lipp Peter,Sadeghi Ahmad-Reza,Koch Klaus-Michael.Trusted Computing-Challenges and Applications.Berlin:Springer,2008:166-178.
  • 7Brickell Ernie,Li Jiang-Tao.Enhanced privacy ID from bilinear maps.Cryptology ePring Archive:095,2009.
  • 8Au Man H,Susilo Willy,Mu Yi.Constant-size dynamic k -TAA//Prisco Roberto D,Yung Moti.Security and Cryptography for Networks.Berlin:Springer,2006:111-125.
  • 9Camenisch Jan,Stadler Markus.Efficient group signature schemes for large groups//Kaliski Burton S.Advances in Cryptology.Berlin:Springer,1997:410-424.
  • 10Fiat Amos,Shamir Adi.How to prove yourself:Practical solutions to identification and signature problems//Odlyzko Andrew M.Advances in Cryptology.Berlin:Springer,1987:186-194.

二级参考文献32

  • 1Bellare M, Neven G. Transitive signatures based on factoring and RSA. In: Zheng Y, ed. Proc. of the Advances in CryptologyASIACRYPT 2002. LNCS 2501, Berlin, Heidelberg: Springer-Verlag, 2002. 397-4 14.
  • 2Goh EJ, Jarecki S. A signature scheme as secure as the Diffie-Hellman problem. In: Biham E, ed. Proc. of the Advances in Cryptology-EUROCRYPT 2003. LNCS 2656, Berlin, Heidelberg: Springer-Verlag, 2003. 401-415.
  • 3Koeune F. Careful design and integration of cryptographic primitives with contributions to timing attack, padding schemes and random number generators [Ph.D. Thesis]. Louvain-la-Neuve: Universite Catholique de Louvain, 2001.
  • 4Gennaro R, Halevi S, Rabin T. Secure Hash-and-sign signatures without the random oracle. In: Stern J, ed. Proc. of the Advances in Cryptology-EUROCRYPT'99. LNCS 1592, Berlin, Heidelberg: Springer-Verlag, 1999.123-139.
  • 5Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proc. of the Advances in Cryptology-Crypto'98. LNCS 1462, Berlin, Heidelberg: Springer-Verlag, 1998. 13-25.
  • 6Needham R, Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978,21 (12) :993 -999.
  • 7Sacco G. Timestamps in key distribution protocols. Communications of the ACM, 1981,24(8):523-536.
  • 8Burrows M, Abadi M, Needham R. A logic for authentication. ACM Trans. on Computer Systems, 1990,8(1):18-36.
  • 9Bellare M, Rogaway P. Entity authentication and key exchange. In: Stinson D.R, ed. Proc. of the Advances in CryptologyCrypto'93. LNCS 773, Berlin, Heidelberg: Springer-Verlag, 1993. 232-249.
  • 10Bellare M. Provably secure session key distribution-The three party case. In: Proc. of the ACM Symp. on the Theory of Computing. New York: ACM Press, 1995.57-66. http:∥doi.acm.org/10.1145/225058.225084.

共引文献108

同被引文献61

引证文献5

二级引证文献124

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部