期刊文献+

可信DRM中直接匿名认证的应用研究

Application of Direct Anonymous Attestation in Trusted DRM
下载PDF
导出
摘要 数字版权管理(DRM)技术一直致力于数字内容的保护,特别是防止售后非法使用.而所依靠的密码学保护措施很容易被攻击和破解.为了在硬件方面加入保护,可信DRM引入了TPM安全芯片,借助TPM在身份认证、许可授权等方面加强保护.为了解决身份认证时用户隐私泄露的问题,可信DRM采用了直接匿名认证协议.在此基础上提出了基于零知识认证和ElGamal算法的双随机数签名的改进方案,并介绍了该方案在可信DRM中是如何应用的.最后经过分析得出该方案在安全性和匿名性方面都有所提高. Digital Rights Management(DRM)is a technology to protect digital contents from illegal usages after sale. DRM depends on soft cryptography protection,which is a weak protection against hackers. Trusted DRM applied TPM security chip to improve protection in terms of hardware for authentication,licensing and other aspects. To overcome the problem of user privacy,trusted DRM used direct anonymous authentication protocol. On this basis,this article proposed an improved protocol based on zero-knowledge proof and ElGamal signature algorithm of double random numbers, and then described its application in trusted DRM. The proposed technique could improve security and anonymity in DRM.
出处 《南京师大学报(自然科学版)》 CAS CSCD 北大核心 2014年第1期112-116,共5页 Journal of Nanjing Normal University(Natural Science Edition)
基金 国家自然科学基金(61272420)
关键词 零知识认证 ElGamal算法 DRM 可信DRM TPM DRM trusted DRM TPM zero-knowledge proof ElGamal algorithm
  • 相关文献

参考文献9

二级参考文献47

  • 1韩小西,王贵林,鲍丰,任奎.针对基于离散对数多重签名方案的一种攻击[J].计算机学报,2004,27(8):1147-1152. 被引量:24
  • 2王连海,王英龙.基于DLP的有代理的多重数字签名方案研究[J].通信学报,2005,26(12):37-42. 被引量:4
  • 3于成尊,王彩芬,刘军龙,贾爱库.基于椭圆曲线的有代理的多重签名[J].计算机应用研究,2006,23(10):113-115. 被引量:4
  • 4Trusted Computing Group.TCPA Main Specification Version 1.1b[EB/OL].[2002-02-25].http://www.trustedcomputinggroup.org.
  • 5Trusted Computing Group.TCG TPM Specification Version 1.2[EB/OL].[2003-10-27].http://www.trustedcomputinggroup.org.
  • 6Camenisch J.Better Privacy for Trusted Computing Platforms[C]//Computer Security-ESORICS,9th European Symposium on Research in Computer Security.2004:73-88.
  • 7Rudolph C.Convert Identity Information in Direct Anonymous Attestation(DAA)[C]//22nd IFIP TC-11 International Information Security Conference(SEC 2007) on New Approaches for Security,Privacy and Trust in Complex Environments,IFIP International Federation for Information Processing.2007:443-448.
  • 8Arbaugh B.Improving the TCPA Specification[J].IEEE Computer,2002:35 (8):77-79.
  • 9Reid J,Gonzlez Nieto J M,Dawson E,et al.Privacy and Trusted Computing[C]//Proceedings of the 14th International Workshop on Database and Expert System Application(DEXA '03).2003:12-17.
  • 10Naor M,Nissim K.Certificate Revocation and Certificate Update[C]//Proceedings 7th USENIX Security Symposium (San Antonio,Texss).1998:17-28.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部