期刊文献+

基于Chameleon哈希改进的平台配置远程证明机制 被引量:2

Improved Remote Attestation Mechanism of Platform Configuration Based on Chameleon Hashes
下载PDF
导出
摘要 为了进一步提高平台配置远程证明机制的实用性,针对RAMT(remote attestation based on Merkle hashtree)方案的不足,基于Chameleon哈希算法,采用软件分组的思想,改进了RAMT方案,给出了实验证明。认真讨论了RAMT方案的特点,详细描述了改进后的RAMT方案的体系结构、度量及验证过程,并深入讨论了新机制的特点。实验结果表明,新机制不仅提高了远程证明机制的可伸缩性,而且进一步增强了隐私保护能力,从而进一步提高了方案的实用性。 In order to obtain a practical remote attestation mechanism for platform configurations,an improved RAMT(remote attestation based on Merkle hash tree) method was proposed using chameleon hashes and software group.And the relevant proof was given.The problems of the existing methods were analyzed.And the architecture of improved scheme,its process of integrity measurement and attestation were discussed in detail.The advantages of new scheme were also discussed.Compared with RAMT,the scalability and the ability to protect privacy are enhanced,and the efficiency of the remote attestation is improved highly.
出处 《计算机科学》 CSCD 北大核心 2013年第1期118-121,共4页 Computer Science
基金 山西省留学基金项目(2009-28) 山西省自然科学基金项目(2009011022-2) 中北大学自然科学基金资助
关键词 可信计算 远程证明 Chameleon哈希 软件分组 Trusted computing Rremote attestation Chameleon hash Software group
  • 相关文献

参考文献7

  • 1Trusted Computing Group. TCG specification architecture overview revision 1.4[EB/OL].http://www.Trusted comp-uting-group.org/,2007.
  • 2Trusted Computing Group. TPM main specification version 1.2 revision 103 part 1 & 2 & 3[EB/OL].http://www.trusted computinggroup.org/,2007.
  • 3Sailer R,Zhang X L,Jaeger T. Design and implementation of a TCG-based integrity measurement architecture[A].Berkley:USENIX Association,2004.223-238.
  • 4徐梓耀,贺也平,邓灵莉.一种保护隐私的高效远程验证机制[J].软件学报,2011,22(2):339-352. 被引量:14
  • 5Alsouri S,Dagdelen (O),Katzenbeisser S. Group-based attestation:Enhancing privacy and management in remote attestation[A].Beilin:Springer-Verlag,2010.63-67.
  • 6Ateniese G,de Medeiros B. On the key exposure problem in chameleon hashes[A].Italy:Springer-Verlag,2005.165-179.
  • 7张志勇,牛丹梅.数字版权管理中数字权利使用控制研究进展[J].计算机科学,2011,38(4):48-54. 被引量:16

二级参考文献32

  • 1张志勇,叶传奇,范科峰,张丽丽,牛丹梅.DRM安全策略的模糊层次分析法效用评估及选取[J].通信学报,2009,30(S1):126-131. 被引量:3
  • 2俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968. 被引量:141
  • 3范科峰,莫玮,曹山,赵新华,裴庆祺.数字版权管理技术及应用研究进展[J].电子学报,2007,35(6):1139-1147. 被引量:64
  • 4Trusted Computing Group. TCG specification architecture overview revision 1.4. 2007. http://www.trustedcomputinggroup.org/.
  • 5Trusted Computing Group. TPM main specification version 1.2 revision 103 part 1 & 2 & 3. 2007. http://www. trustedeomputinggroup.org/.
  • 6Sailer R, Zhang XL, Jaeger T, van Doom L. Design and implementation of a TCG-based integrity measurement architecture. In: Proc. of the 13th USENIX Security Symp. Berkley: USENIX Association, 2004. 223-238.
  • 7Jaeger T, Salter R, Shankar U. PRIMA: Policy-Reduced integrity measurement architecture. In: Ferraiolo D, et al., eds. Proc. of the 11th ACM Symp. on Access Control Models and Technologies. New York: ACM, 2006. 19-28.
  • 8Merkle RC. Protocols for public key cryptosystems. In: Proc. of the IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 1980. 122-134.
  • 9Merkle RC. A certified digital signature. In: Brassard G, ed. Proc. of the 9th Annual Int'l Cryptology Conf. on Advances in Cryptology. Heidelberg: Springer-Verlag, 1989. 218-238. [doi: 10.1007/0-387-34805-0_21].
  • 10Sadeghi A, Stiible C. Property-Based attestation for computing platforms: caring about properties, not mechanisms. In: Raskin V, ed. Proc. of the 2004 Workshop on New Security Paradigms. New York: ACM, 2004.67-77. [doi: 10.1145/1065907.1066038].

共引文献28

同被引文献5

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部