期刊文献+

基于可信计算的动态组件属性认证协议

Protocol for dynamic component-property attestation in trusted computing
下载PDF
导出
摘要 远程认证是可信计算平台的一种重要功能,二进制方法和基于属性证书的认证是其两种认证方法。属性认证能隐藏平台软件和硬件的配置信息,是静态的,不能动态验证现在正在运行的平台的实时信息。结合这两种方法的优点,提出了一种基于动态组件属性的认证协议,将二进制认证、属性认证和组件认证结合到该协议中。对协议进行了详细的说明和安全性分析,实验结果表明,该认证方法是有效的、保密的和可行的。 Remote attestation is one ofthe important functionalities oftmsted computing. Binary attestation and property-based attestation are two methods of authentication. Property-based attestation can conceal information about the configuration of a platform hardware and software or application, which is static and cannot get dynamic properties that represent runtime properties. A new method is proposed, which combines both approaches into a dynamic component-property attestation protocol, a protocol for remote attestation is demonstrated in detail, and its security is analyzed. The experimental result shows that the scheme improve the efficiency and credibility of remote attestation.
出处 《计算机工程与设计》 CSCD 北大核心 2011年第2期493-496,共4页 Computer Engineering and Design
基金 山西省自然科学基金项目(2009011022-2) 山西省留学基金项目(2009-28)
关键词 存储测量日志 基于属性 远程认证 动态组件属性认证 可信计算 store d measurement log property-based remote attestation DCPA trusted computing
  • 相关文献

参考文献8

  • 1Trusted Computing Group.TCG Specification architecture over- view specification revision 1.2 [EB/OL]. http://www.trusted- computinggroup.org/In Mar,2010.
  • 2Trusted Computing Group. TCG Specification Architecture Overview[S].USA:Trusted Computing Group,2007:5-40.
  • 3Stumpf F, Tafreschi O, Roder P, et al.A robust integrity reporting protocol for remote attestation[C].Tokyo,Japan:Second Work- shop on Advances in Trusted Computing (WATC 2006 Fall), 2006.
  • 4Huang Xin,Peng Yuxing.An effective approach for remote attes- tation in trusted computing[C].Nanchang,China:Proceedings of the 2009 International Symposium on Web Information Systems and Applications,2009:80-83.
  • 5AhmadReza S,Christian.Property-based attestation for compu- ting platforms:Caring about properties,not mechanisms[C].Pro- ceedings of the 2004 Workshop on New Security Paradigms. USA:ACM,2004:67-77.
  • 6Chen LiQun,Rainer Landfermann,Markus Rohe,et al.A protocol for property-based attestation[C].Proceedings of the first ACM Workshop on Scalable Trusted Computing. Alexandria. USA: ACM,2006:7-16.
  • 7Haldar V.Semantic remote attestation[D].University of Califor- nia,2006.
  • 8秦宇,冯登国.基于组件属性的远程证明[J].软件学报,2009,20(6):1625-1641. 被引量:33

二级参考文献15

  • 1TCG Group. TPM main part l, design principles specification. Version 1.2. 2003. https://www.trustedcomputinggroup.org/home.
  • 2TCG Group. TCG architecture overview specification. 2004. https://www.trustedcomputinggroup.org/home.
  • 3TCG Group. TCG software stack (TSS) specification. Version 1.10. 2003. https://www.trustedcomputinggroup.org.
  • 4Sailer R, Zhang XL, Jaeger T, Doom LV. Design and implementation of a TCG-based integrity measurement architecture. In: Proc. of the 13th Usenix Security Symp. San Diego: Usenix Press, 2004. 16-16.
  • 5Smith S. Trusted Computing Platforms--Design and Applications. New York: Springer-Verlag, 2005. 193-194.
  • 6Seshadri A, Perrig A, Doom LV, Khosla P. SWATT: Software-Based attestation for embedded devices. In: Proc. of the IEEE Security & Privacy Conf. Oakland: IEEE Press, 2004. 272-282.
  • 7Garfinkel T, Rosenblum M, Boneh D. Flexible OS support and applications for trusted computing. In: Proc. of the 9th Workshop on Hot Topics in, Operating Systems (HotOS IX). Hawaii: Usenix Association, 2003.25-25.
  • 8Haldar V, Chandra D, Franz M. Semantic remote attestation: A virtual machine directed approach to trusted computing. In: Proc. of the USENIX Virtual Machine Research and Technology Syrup. San Jose: Usenix Press, 2004.29-41.
  • 9Poritz J, Schunter M, Herreweghen EV, Waidner M. Property attestation--Scalable and privacy-friendly security assessment of peer computers. IBM Research Report, RZ 3548, 2004.
  • 10Sadeghi A, St(ible C. Property-Based attestation for computing platforms: Caring about properties, not mechanisms. In: Proc. of the New Security Paradigms Workshop. Nova Scotia: ACM Press, 2004. 67-77.

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部