期刊文献+

一种改进的属性远程证明方案 被引量:1

An Improved Property-based Remote Attestation
下载PDF
导出
摘要 为了克服现有基于属性证书的远程证明方案在隐私保护和安全性方面的不足,文中提出了一种基于隐藏证书技术的属性远程证明方案(HCP-RA),该方案在传统基于属性的远程证明的基础上引入了隐藏证书技术,实现了对机密性证书和策略的保护,同时实现了验证方和被验证方之间的双向可信性验证功能。文中首先给出了HCP-RA模型,随后针对该模型给出了形式化描述和相应的远程证明协议,并通过应用实例来说明该协议的具体工作过程。与传统的基于属性证书的远程证明技术相比较,该方案在隐私保护方面具有很大优势;双向可信性验证提高了传统单向属性远程证明的安全性。 For the defects of privacy protection and security in the Property Based Remote Attestation,an improved remote attestation method is given.This method is based on Hidden Credential technology named as HCP-RA(Hidden Credentials supported Property based Remote Attestation).The endpoints of communication in this model verify the trusted character of each other.After given the model of HCP-RA,formalized description and protocol of this model are given.In order to descript the message transformation process,an example of this protocol is given.Compare with the Property Based Remote Attestation in nowadays,HCP-RA has advantages in privacy and policy protection.Bidirectional creditability verification improves the environment's security.
出处 《实验科学与技术》 2012年第1期47-51,共5页 Experiment Science and Technology
关键词 远程证明 可信计算 隐藏证书 证明策略 remote attestation trusted computing hidden credentials attestation policy
  • 相关文献

参考文献7

  • 1Trusted Computing Group.TCG Specification Architecture Overview Revision 1.4[EB/OL].[2007-10-01]http://www.trustedcomputinggroup.org/,2007-10.
  • 2Trusted Computing Group.TCG Specification ArchitectureOverview Revision 1.4[EB/OL].[2007-10-01]http://www.trustedcomputinggroup.org/,2007-10.
  • 3Sadeghi A,Studle C.Property-based Attestation for Com-puting Platforms:Caring about Properties,Not Mechanisms[C]//Proceedings of New Security Paradigms Workshop2004.New York:Association for Computing Machinery,2004,67-77.
  • 4Chen L.,Landfermann R,Lohr H,et al.A Protocol forProperty-based Attestation.[C]//Proceedings of the firstACM workshop on Sealable trusted computing,Alexandria,Virginia,USA:ACM Press,Nov 2006:88-102.
  • 5Boneh D,Franklin M.Identity based encryption from theweil pairing.[C]//Proceedings of Crypto2001,Advancesin Cryptology,Lecture in Computing Science,Springer-Verlag,2001,2139:213-229.
  • 6Bradshaw R W,Holt J E,Seamons K E.Concealing com-plex policies with hidden credentials.[C]//In EleventhACM Conference on Computer and Communications Securi-ty,[S.l]:Washington,DC,2004:146-157.
  • 7Trusted Computing Group.TCG Trusted Network ConnectTNC Architecture for Interoperability.Specification Ver-sion1.4[EB/OL],[2009-05-20]https://www.trustedcomputinggroup.org.

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部