期刊文献+

一种基于属性环签名的高效匿名证明协议 被引量:1

Efficient anonymous attestation from attribute-based ring signature
下载PDF
导出
摘要 远程证明是可信计算领域中亟待突破的重要问题。结合二进制证明和基于属性的证明,应用环签名思想提出了一种简单、高效的匿名远程证明协议。该协议不需要属性证书,也不需要AIK证书,它通过借助一个离线可信第三方,应用可信计算绑定和密封机制,采用基于双线性对的属性环签名,同时实现了平台的身份证明和完整性状态证明。分析和实验表明,该协议具有不可伪造性、平台身份匿名性、配置隐私保护性和抗共谋性,并具有很高的运行效率;与现有典型的基于双线性对证明协议相比,签名长度减少了79.73%,所需验证的双线性对减少了50.00%,很好地解决了一直困扰可信计算中的远程证明和效率问题。 Remote attestation is an important problem needed to be resolved in trusted computing.This paper proposed an elegant,highly-efficient and anonymous remote attestation protocol.It combined binary attestation with property-based attestation and adopted the thought of ring signature.It needed neither property certificates nor AIK certificates.It concurrently achieved the identity attestation and the integrity attestation for platforms,by resorting to an off-line trusted third party,mechanisms of binding and sealing in trusted computing and attribute-based ring signature from bilinear maps.The analysis and experiment show the protocol satisfies the properties of non-forgeability,anonymity of platform identity,protection of configuration privacy and resistance to collusion,and has fine performance.Compared with the existing typical attestation protocol from bilinear maps,the size of the signature decreases by 79.73%,and the pairing operations also decrease by 50%.The protocol has perfectly resolved the trouble problems of remote attestation and efficiency in trusted computing
作者 罗东俊 张军
出处 《计算机应用研究》 CSCD 北大核心 2012年第9期3470-3474,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(60873198) 广东省自然科学基金资助项目(10151032001000003) 广州市科学技术局资助项目(2009J1-C391)
关键词 远程证明 可信计算 基于属性 环签名 安全 remote attestation trusted computing attribute-based ring signature security
  • 相关文献

参考文献13

  • 1冯登国,秦宇,汪丹,初晓博.可信计算技术研究[J].计算机研究与发展,2011,48(8):1332-1349. 被引量:116
  • 2Trusled Computing Platform Alliance. TCPA design philosophies and concepts versionl. 0 [ EB/OL]. ( 2001- 01 ). https://www. trusted-computinggroup. org.
  • 3BRICKELL E,CAMENISCH J,CHEN Li-qun. Direct anonymous attestation [ C ] //Proc of the 11th ACM Conference on Computer and Commnuications Security. New York : ACM Press ,2004 : 132-145.
  • 4刘吉强,赵佳,赵勇.可信计算中远程自动匿名证明的研究[J].计算机学报,2009,32(7):1304-1310. 被引量:18
  • 5HALDAR V,CHANDRA D,FRANZ M. Semantic remote attestation: a virtual machine directed approach to trusted computing [ C ]//Proc of the 3rd Virtual Machine Research and Technology Symposium. Berkeley : USENIX Association ,2004 :3.
  • 6徐梓耀,贺也平,邓灵莉.一种保护隐私的高效远程验证机制[J].软件学报,2011,22(2):339-352. 被引量:14
  • 7SADEGHI A R,STUBLE C. Property-based attestation for computing platforms : caring about properties, not mechanisms [ C ]//Proc of Workshop on New Security Paradigms. New York: ACM Press,2004: 67-77.
  • 8RIVEST R L,SHAMIR A.TAUMAN Y. How to leak a secret[C]// Proc of the 7 th International Conference on the Theory and Application of Cryptology and Information Security : Advances in Cryptology. London :Springer-V erlag, 2001 :552-565.
  • 9WANG Wen-qiang, CHEN Shao-zhen. An efficient attribute-based ring signature scheme[ C ] //Proc of International Forum on Compu-ter Science-Technology and Applications. Washington DC:IEEE Computer Society ,2009:147-150.
  • 10Trusted Computing Group. TPM main specification versionl. 2 [ EB/ OL]. (2005-10). http://www. trustedcomputinggroup. org.

二级参考文献80

  • 1张焕国,严飞,傅建明,徐明迪,杨飏,何凡,詹静.可信计算平台测评理论与关键技术研究[J].中国科学:信息科学,2010,40(2):167-188. 被引量:13
  • 2冯登国,秦宇.一种基于TCM的属性证明协议[J].中国科学:信息科学,2010,40(2):189-199. 被引量:8
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 5李晓勇,左晓栋,沈昌祥.基于系统行为的计算平台可信证明[J].电子学报,2007,35(7):1234-1239. 被引量:35
  • 6Trusted Computing Group. TCG specification architecture overview revision 1.4. 2007. http://www.trustedcomputinggroup.org/.
  • 7Trusted Computing Group. TPM main specification version 1.2 revision 103 part 1 & 2 & 3. 2007. http://www. trustedeomputinggroup.org/.
  • 8Sailer R, Zhang XL, Jaeger T, van Doom L. Design and implementation of a TCG-based integrity measurement architecture. In: Proc. of the 13th USENIX Security Symp. Berkley: USENIX Association, 2004. 223-238.
  • 9Jaeger T, Salter R, Shankar U. PRIMA: Policy-Reduced integrity measurement architecture. In: Ferraiolo D, et al., eds. Proc. of the 11th ACM Symp. on Access Control Models and Technologies. New York: ACM, 2006. 19-28.
  • 10Merkle RC. Protocols for public key cryptosystems. In: Proc. of the IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 1980. 122-134.

共引文献149

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部