期刊文献+

基于TPM的强身份认证协议研究 被引量:2

Research on TPM-based Strong ID Authentication Protocol
下载PDF
导出
摘要 根据可信计算领域中对身份认证的要求,提出一种基于TPM的强身份认证协议。介绍可信平台模块架构,给出其支持的密钥类型,按照进程理论建立协议模型,阐述协议扩展方案,包括引入PCR挑战、实现跨平台认证,并采用网络开发技术加以实现。实验结果表明,该协议可有效对用户身份进行验证。 In terms of the requirement of ID authentication in trusted computing filed, this paper proposes a Trusted Platform Module(TPM)- based strong ID authentication protocol. TPM is reviewed as well as the types of keys supported and their relationship. A mathematical model of the protocol using the formal method of process theory is designed. The extension of the protocol is discussed, including Platform Configuration Register(PCR) challenging and implementing platform independence. An application scenario of the protocol by network development technology is implemented. Experimental results show the protocol can authenticate users' ID effectively.
出处 《计算机工程》 CAS CSCD 2012年第4期23-27,共5页 Computer Engineering
基金 国家自然科学基金资助项目(60903020 60903189 60773094) 国家"863"计划基金资助项目(2008AA01Z403) 上海市曙光计划基金资助项目(07SG32)
关键词 可信平台模块 数字签名 公钥加密 JAVA平台 Trusted Platform Module(TPM) digital signature public key encryption Java platform
  • 相关文献

参考文献21

  • 1Trusted Computing Group. TCG Specification Architecture Over- view[EB/OL]. (2007-11-21). http://www.mendeley.com/research/ tcg-specification-architecture-overview/.
  • 2Edward L. Cyber Physical Systems: Design Challenges[EB/OL]. (2010-11-21). http://www.eecs.berkeley.edu/Pubs/TechRpts/2008/ EECS-2008-8.html.
  • 3Smith S W. Trusted Computing Platforms: Design and Appli- cations[M]. [S. l.] : Springer-Verlag, 2005.
  • 4Gallery E. Trusted Computing[M]. [S. l.] : IEEE Press, 2005.
  • 5Balacheff B, Chen Liqun, Pearson S, et al. Trusted Computing Platforms: TCPA Technology in Context[M]. [S. l.] : Prentice Hall, 2003.
  • 6Kinney S. Trusted Platform Module Basics: Using TPM in Embedded Systems[M]. [S. l.] : Elsevier, 2006.
  • 7Trusted Computing Group. Cloud Computing and Security——A Natural Match[EB/OL]. (2010-09-21). http://www.trusted-computing- group.org.
  • 8Hanna S. A Security Analysis of Cloud Computing[EB/OL]. (2010-12-21). http://cloudcomputing.sys-con.com/node/1203943.
  • 9Challener D, Yoder K, Catherman R, et al. A Practical Guide to Trusted Computing[M]. [S. l.] : IBM Press, 2008.
  • 10Stinson D R. Cryptography: Theory and Practice[M]. 3rd ed. [S. l.] : Chapman & Hall, 2005.

二级参考文献3

  • 1Eun K R,Eun J Y,Kee Y Y.An Efficient ID-based Authenticated Key Agreement Protocol from Pairings[C]//Proceedings of the 3rd International IFPS-TC6 Networking Conference.2004.
  • 2Khalili A,Katz J,Arbaugh W A.Toward Secure Key Distribution in Truly Ad-hoc Networks[C]//Proceedings of Applications and the Internet Workshops.2003.
  • 3Luo H,Lu S.Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks[R].Los Angeles:Dept.of Computer Science,University of California,Technical Report:TR-200030,2000.

共引文献2

同被引文献9

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部