期刊文献+

基于双线性对签密的安全高效远程证明协议 被引量:2

Safe and efficient remote attestation protocol based on bilinear pairings signcryption
下载PDF
导出
摘要 为了解决当前远程证明方案中安全性差、效率较低的问题,提出了一种安全高效的模块级远程证明协议。该协议在构建模块属性签名时采用了签密方案,减少了属性证书的生成时间;而且采用椭圆曲线上基于双线性对的签密方案,同时也大大提高了属性证书的安全性。通过实验验证了协议的可行性。实验结果表明,该方案可以快速生成可信平台中各模块的属性签名,提高了远程证明的效率。 In order to deal with the poor security and low efficiency in remote attestation, a module-level safe and efficient property attestation protocol was proposed. In the protocol, the signcryption was used to build the module property signature, which could reduce the time of building property certificate. And the signcryption scheme based on the bilinear pairings over elliptic curves also enhanced the security of property certificate. Finally, a model instance was presented to verify the feasibility of the protocol. The experiments show that the program can quickly generate the module property signature and improves the efficiency of the remote attestation.
作者 何龙 彭新光
出处 《计算机应用》 CSCD 北大核心 2013年第10期2854-2857,共4页 journal of Computer Applications
基金 山西省自然科学基金资助项目(2009011022-2) 山西省留学基金资助项目(2009-28)
关键词 可信计算 远程证明 模块 双线性对 签密 trusted computing remote attestation module bilinear pairing signcryption
  • 相关文献

参考文献12

  • 1Trusted Computing Group. TPM specification version 1.2 revision 103: Part 1 - Design principles[ S/OL]. [ 2013- 04- 17]. http:// www. trustedcomputinggroup, org/files/resource_ files/646BE624- 1 D09-3519-ADDA61BE37A21A74/mainP1DPrevl03. pdf.
  • 2Trusted Computing Group. TPM Specification Version 1.2 Revision 103: Part 2 - Structures [ S/OL]. [ 2013- 04- 17 ]. http://www. trustedcomputinggroup, org/files/resource _ files/E14876A3-1A4B- B294-D086297 AIED38 P96/mainP2 Structrev103. pdf.
  • 3Trusted Computing Group. TPM Specification Version 1.2 Revision 103: Part 3 - Commands[ S/OL]. [ 2013- 04- 17]. http://www. trustedcomputinggroup, org/files/resource _ files/E 14A09 AD-1 A4 B- B294-D049ACC1 A1 A138ED/mainP3Commandsrev103. pdf.
  • 4SAILER R, ZHANG X L, JAEGER T, et al. Design and imple- mentation of a TCG-based integrity measurement architecture[ C]// Proceedings of the 13th Usenix Security Symposium. Berkeley: USENIX, 2004:223-238.
  • 5JAEGER T, SAILER R, SHANKAR U. PRIMA: policy-reduced integrity measurement architecture [ C ]// Proceedings of the 11 th ACM Symposium on Access Control Models and Technologies. New York: ACM, 2006:19-28.
  • 6SADEGHI A, STLIBLE C. Property-based attestation for computing platforms: Caring about properties, not mechanisms[ C]/! Proceed- ings of the 2004 New Security Paradigms Workshop. New York: ACM, 2004: 67-77.
  • 7PORITZ J, SCHUNTER M, HERREWEGHEN E V, et al. Property attestation-scalable and privacy-friendly security assessment of peer computers, RZ3548[ R]. Zurich, Switzerland: IBM Zurich Research Laboratory, 2004.
  • 8CHEN L Q, LANDFERMANN R, LOHR H, et al. A protocol for property-based attestation[ C]// Proceedings of the 1 st ACM work- shop on Scalable Trusted Computing. New York: ACM, 2006:7 - 16.
  • 9CHEN L Q, LOHR H, MANULIS M, et al. Property-based attesta- tion without a trusted third party[ C]//Proceedings of the 11 th Inter- national Conference on Information Security, LNCS 5222. Berlin: Springer 2008:31 -46.
  • 10秦宇,冯登国.基于组件属性的远程证明[J].软件学报,2009,20(6):1625-1641. 被引量:33

二级参考文献15

  • 1TCG Group. TPM main part l, design principles specification. Version 1.2. 2003. https://www.trustedcomputinggroup.org/home.
  • 2TCG Group. TCG architecture overview specification. 2004. https://www.trustedcomputinggroup.org/home.
  • 3TCG Group. TCG software stack (TSS) specification. Version 1.10. 2003. https://www.trustedcomputinggroup.org.
  • 4Sailer R, Zhang XL, Jaeger T, Doom LV. Design and implementation of a TCG-based integrity measurement architecture. In: Proc. of the 13th Usenix Security Symp. San Diego: Usenix Press, 2004. 16-16.
  • 5Smith S. Trusted Computing Platforms--Design and Applications. New York: Springer-Verlag, 2005. 193-194.
  • 6Seshadri A, Perrig A, Doom LV, Khosla P. SWATT: Software-Based attestation for embedded devices. In: Proc. of the IEEE Security & Privacy Conf. Oakland: IEEE Press, 2004. 272-282.
  • 7Garfinkel T, Rosenblum M, Boneh D. Flexible OS support and applications for trusted computing. In: Proc. of the 9th Workshop on Hot Topics in, Operating Systems (HotOS IX). Hawaii: Usenix Association, 2003.25-25.
  • 8Haldar V, Chandra D, Franz M. Semantic remote attestation: A virtual machine directed approach to trusted computing. In: Proc. of the USENIX Virtual Machine Research and Technology Syrup. San Jose: Usenix Press, 2004.29-41.
  • 9Poritz J, Schunter M, Herreweghen EV, Waidner M. Property attestation--Scalable and privacy-friendly security assessment of peer computers. IBM Research Report, RZ 3548, 2004.
  • 10Sadeghi A, St(ible C. Property-Based attestation for computing platforms: Caring about properties, not mechanisms. In: Proc. of the New Security Paradigms Workshop. Nova Scotia: ACM Press, 2004. 67-77.

共引文献32

同被引文献14

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部