期刊文献+

一种基于属性证书的动态可信证明机制

Trusted Dynamic Attestation Mechanism Based on Property Certificate
下载PDF
导出
摘要 基于可信计算的远程证明的方法中,二进制证明方法能反映系统平台当前配置的完整性状态,是动态的,但容易暴露隐私,而基于属性证书的证明将系统平台的配置信息隐藏,具有匿名性,但是静态的.将二进制方法嵌入到属性证书方法中,提出了一种动态属性可信证明(Dynamic Property Trusted Attestation DPTA)的协议.验证者通过模拟计算PCR值,并与证书中的PCR值进行比较,证明示证者的当前平台满足一定的安全属性,解决了暴露隐私和静态问题.实验表明这种证明方法能保护平台隐私,克服基于属性证书的静态特点,兼有实时性和保密性的特点. In the methods of remote attestation based on trusted computing, binary attestation can reflect real-time status of the plat- form and verify the integrity of remote computing system but easy to disclose privacy, on the other hand, property-based certificate at- testation can conceal platform configuration with anonymity but is static. Binary attestation is embedded into property-based certificate attestation, Dynamic Property Trusted Attestation ( DPTA ) protocol is proposed, which combines their advantages. Verifier checked whether attestor satisfies certain security property through calculating real-time PCR values and comparing with PCR value of certifi- cate. The method has solved privacy exposure and static problems. Experiment verifications show that the scheme can protect the pri- vacy of platform, overcome the static features based on property certificate, and be real time and confidential feature.
作者 闫建红
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第10期2349-2353,共5页 Journal of Chinese Computer Systems
基金 山西省高等学校科技项目(20101115)资助 山西省科技基础条件平台建设项目(2012091003-0104)资助 山西省科技攻关计划项目(20110321024-02)资助 国家自然基金项目(61273294)资助
关键词 可信计算 可信平台模块 二进制证明 属性证书证明 动态属性可信证明 trusted computing TPM binary attestation property certificate attestation dynamic property trusted attestation ( DPTA )
  • 相关文献

参考文献3

二级参考文献48

  • 1TCG Group. TPM main part l, design principles specification. Version 1.2. 2003. https://www.trustedcomputinggroup.org/home.
  • 2TCG Group. TCG architecture overview specification. 2004. https://www.trustedcomputinggroup.org/home.
  • 3TCG Group. TCG software stack (TSS) specification. Version 1.10. 2003. https://www.trustedcomputinggroup.org.
  • 4Sailer R, Zhang XL, Jaeger T, Doom LV. Design and implementation of a TCG-based integrity measurement architecture. In: Proc. of the 13th Usenix Security Symp. San Diego: Usenix Press, 2004. 16-16.
  • 5Smith S. Trusted Computing Platforms--Design and Applications. New York: Springer-Verlag, 2005. 193-194.
  • 6Seshadri A, Perrig A, Doom LV, Khosla P. SWATT: Software-Based attestation for embedded devices. In: Proc. of the IEEE Security & Privacy Conf. Oakland: IEEE Press, 2004. 272-282.
  • 7Garfinkel T, Rosenblum M, Boneh D. Flexible OS support and applications for trusted computing. In: Proc. of the 9th Workshop on Hot Topics in, Operating Systems (HotOS IX). Hawaii: Usenix Association, 2003.25-25.
  • 8Haldar V, Chandra D, Franz M. Semantic remote attestation: A virtual machine directed approach to trusted computing. In: Proc. of the USENIX Virtual Machine Research and Technology Syrup. San Jose: Usenix Press, 2004.29-41.
  • 9Poritz J, Schunter M, Herreweghen EV, Waidner M. Property attestation--Scalable and privacy-friendly security assessment of peer computers. IBM Research Report, RZ 3548, 2004.
  • 10Sadeghi A, St(ible C. Property-Based attestation for computing platforms: Caring about properties, not mechanisms. In: Proc. of the New Security Paradigms Workshop. Nova Scotia: ACM Press, 2004. 67-77.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部