期刊文献+

基于属性的零知识证明数据封装方法

Method of data sealing based on property with zero-knowledge proof
下载PDF
导出
摘要 通过分析TCG对可信计算平台中平台配置寄存器的定义,结合数据封装技术的相关研究,提出了一种可信平台的属性表示方法,该方法可以较全面地刻划一个可信平台的特征,并方便进行零知识证明的属性验证。针对可信计算平台固有的暴露用户隐私的缺陷,将零知识证明引入平台的属性验证过程,提出了一种第三方参与的基于属性的零知识证明数据封装方法。对该方法进行了安全性分析和实验的验证,实验结果表明,该方法在保持已有方案优势的前提下,有较小的数据增加量,可对数据的远程解封提供支持,且能避免可信平台隐私信息的泄漏。 By analyzing the definition of the platform configuration registers (PCRs) in the trusted computing platform (TCP) by the trusted computing group (TCG) and combining related researches for techniques of data sealing, a method for property representation of the trusted platform. This method not only can fully illustrate all the characteristics of a trusted computing platform is proposed, but also can make the verification process of the properties with the zero-knowledge proof more conveniently. As well known, one major and inherent defect of trusted computing platform is its exposure for user's pri- vacy. Aiming at overcoming such a drawback, a method of data sealing based on property with zero-knowledge proof is pro- posed. And in this method, a Trusted Third Party is invited to make proof for verifying the trusted platform. The analysis for security of the method is presented and verification is made for it by experiment. Results from the experiment shows that, this method maintains as the same advantages as other existed schemes, whereas only with a small quantity of data cost. Such small data incrementation not only supports unsealing at remote server, but also works well for preventing privacy disclosure in a trusted platform.
出处 《计算机工程与设计》 CSCD 北大核心 2013年第1期28-31,54,共5页 Computer Engineering and Design
基金 国家"十一五"科技支撑计划基金项目(2006BAF01A00)
关键词 可信计算 数据封装 属性表示 零知识证明 隐私泄漏 trusted computing data sealing property representatiom zero-knowledge proof~ privacy disclosure
  • 相关文献

参考文献4

二级参考文献39

  • 1郑然,金海,章勤.网格工作流资源层次模型与访问机制[J].华中科技大学学报(自然科学版),2006,34(z1):37-40. 被引量:5
  • 2张焕国,毋国庆,覃中平,刘玉珍,刘毅,彭涛,韩永桥.一种新型安全计算机[J].武汉大学学报(理学版),2004,50(A01):1-6. 被引量:21
  • 3张焕国,刘玉珍,余发江,周强,叶新.一种新型嵌入式安全模块[J].武汉大学学报(理学版),2004,50(A01):7-11. 被引量:7
  • 4林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 5Trusted Computing Group. TCG architecture overview [ EB/OL]. [2008- 11- 10 ]. https ://www. trustedcomputinggroup, orgcZgroups/ TCG 1 4 Architecture_Overview. pdf.
  • 6中国国家密码管理局.可信计算密码支撑平台功能与接口规范[EB/OL].[2008-11-25].http://www.oscca.gov.cn/Doc/6/News_1132.htm.
  • 7Trusted Computing Group. TPM Work Group [ EBIOL]. [2008-11- 10 ], https ://www. trustedcomputinggroup, org/groups/tpm/.
  • 8XU Ming-di, HE Jian, ZHANG Bo, et al. A new data protecting scheme based on TPM[ C]//Proc of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. [ S.l. ] : IEEE Computer Society, 2007: 943-947.
  • 9ENGLAND P, LAMPSON B, MANFERDELLI J, et al. A trusted open platform [J]. IEEE Computer, 2003, 36(7) :55-62.
  • 10中国国家密码管理局.无线局域网产品使用的SMS4密码算法[EB/OL].[2008-11-25].http://www.oscca.gov.cn/doc/6/News1106.htm.

共引文献120

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部