期刊文献+

基于特定区间承诺值证明机制改进的DAA认证方案 被引量:3

Improved Scheme of DAA Authentication Based on Proof Mechanism of a Committed Number Lying in a Specific Interval
下载PDF
导出
摘要 针对目前可信计算平台直接匿名认证(DAA)机制的不足,提出一种改进的匿名认证方案。该方案先采用CA验证示证者的EK证书,协助示证者和DAA颁布者各自生成会话密钥,使DAA颁布者能够为示证者颁发秘密的DAA证书;然后示证者用两承诺值相等协议及CFT证明协议来证明承诺值位于某个特定区间的方法,向验证者证明其平台的真实合法性。分析表明,该方案具有较高的安全性,还具备不可欺骗性、匿名性、撤消性,效率更高。 An improved scheme was proposed against the shortage of current mechanism of direct anonymous attestation(DAA) in trusted computing platform.This scheme firstly adopted the CA to verify the EK certificate of prover to help prover and DAA issuer building the session key respectively.The DAA issuer can issue the secret certificate to the prover with the key.Then the prover used a committed number lying in a specific interval to attest the validity to the verifier by integrating the protocol that two committed numbers are equal with the protocol of the CFT proof.The analy-sis shows that this scheme not only has a higher security,but also is non-fraudulence,anonymity,can be withdrawed and more efficiency.
出处 《计算机科学》 CSCD 北大核心 2012年第8期111-114,共4页 Computer Science
基金 广东省高等学校人才引进专项资金项目(粤财教[2010]343号) 肇庆市科技创新计划项目(2011G212)资助
关键词 直接匿名认证 可信计算 零知识证明 网络安全 Direct anonymous attestation Trusted computing Zero-knowledge proof Network security
  • 相关文献

参考文献12

  • 1Trusted Computing Group. Trusted Computing Platform Al- liance (TCPA) Main Specification Version 1. I b [ EB/OL]. ht- tp://www, trustedcomputinggroup, org,2011-08-20.
  • 2Brickell E, Camenisch J, Chen L. Direct anonymous attestation [EB/OL]. http://eprint, iacr. org/2004/205, pdf,2011-08-20.
  • 3Brickell E, Chen L, Li J. A new direct anonymous attestation scheme from bilinear maps[C]//Proceedings of the 1st Interna- tional Conference on Trusted Computing and Tpust in Informa- tion Technologies. Berlin : Springer-Verlag, 2008 ; 166-178.
  • 4He Ge, Tate S R. A direct anonymous attestation scheme for embedded devices[C]///Proc of the 10th International Confe- rence on Practice and Theory in Public-key. Springer-Verlag, 2007:16-30.
  • 5陈小峰,冯登国.一种基于双线性映射的直接匿名证明方案[J].软件学报,2010,21(8):2070-2078. 被引量:18
  • 6Brickell E, Chen Li-qun, Li Jiang-tao. Simplified security notions of direct anonymous attestation and a concrete scheme from pairings[C] // The Conference on Trusted Computing (TRUST 2008). Villach, Austria, 2008 : 315-330.
  • 7杨亚涛,曹陆林,李子臣,郭宝安,徐树民.基于XTR机制改进的直接匿名认证方案[J].计算机科学,2011,38(4):141-144. 被引量:1
  • 8张京良,马丽珍,王育民.承诺值在特定区间的高效证明[J].西安电子科技大学学报,2006,33(6):949-952. 被引量:1
  • 9Rudolph C. Covert identity information in direct anonymous at- testation[C]//Proceedings of the 22nd IFIP TC-11 International Information Security Conference(SEC2007) on New Approaches for Security, Privacy and Trust in Complex Environments. Springer, Boston, 2007 : 443-448.
  • 10Fujisaki E, Okarnoto T. Statistical zero knowledge protocols to prove modular polynomial relations[C]//Proceedings of CRYP- TO' 97. Berlin:Springer-Verlag,1997:16-30.

二级参考文献30

  • 1伍前红,张键红,王育民.简单证明一个承诺值在特定区间内[J].电子学报,2004,32(7):1071-1073. 被引量:8
  • 2Brickell EF,Camenisch J,Chen LQ.Direct anonymous attestation.In:Brickell E,Camenisch J,Chen LQ,eds.Proc.of the ACM Conf.on Computer and Communications Security.New York:ACM Press,2004.132-145.
  • 3Chaum D,van Heyst E.Group signature.In:Davies DW,ed.Advances in Cryptology-Eurocrypt'91.Berlin:Springer-Verlag,1992.257-265.
  • 4He YF,Zhang JZ.An efficient and secure dynamic group signature scheme.Journal of Software,2005,16(4):609-615 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/16/609.htm[doi:10.1360/jos160609].
  • 5Camenisch J.Better privacy for trusted computing platforms.In:Molva D,ed.Proc.of the ESORICS.Berlin:Springer-Verlag,2004.73-88.
  • 6Brickell E,Li JT.Enhanced privacy ID:A direct anonymous attestation scheme with Enhanced revocation capabilities.Technical Report,2007/194,2007.
  • 7Smyth B,Ryan M,Chen LQ,Ryan M.Direct anonymous attestation (DAA):Ensuring privacy with corrupt administrators.In:Stajano F,ed.Proc.of the 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2007).LNCS 4572,Berlin:Springer-Verlag,2007.218-231.
  • 8Backes M,Maffei M,Unruh D.Zero-Knowledge in the applied pi-calculus and automated verification of the direct anonymous attestaion protocol.Technical Report,2007/289,2007.
  • 9Camenisch J.Protecting (anonymous) credentials with the trusted computing group's TPM V1.2.In:Proc.of the SEC 2006.Berlin:Springer-Verlag,2006.135-147.
  • 10Leung A,Mitchell CJ.Ninja:Non identity based,privacy preserving authentication for ubiquitous environments.In:Krumm P,ed.Proc.of the 9th Int'l Conf.on Ubiquitous Computing.LNCS 4717,Berlin:Springer-Verlag,2007.73-90.

共引文献17

同被引文献45

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部