期刊文献+
共找到608篇文章
< 1 2 31 >
每页显示 20 50 100
可信执行环境:现状与展望 被引量:1
1
作者 张锋巍 周雷 +2 位作者 张一鸣 任明德 邓韵杰 《计算机研究与发展》 EI CSCD 北大核心 2024年第1期243-260,共18页
当前在云服务、移动社交网络下用户普遍追求隐私保护、安全计算,从而推动了隐私计算、机密计算等领域的快速发展.可信执行环境(trusted execution environment,TEE)作为机密计算服务中重要的技术基础已经广泛部署到各类计算平台中.目前,... 当前在云服务、移动社交网络下用户普遍追求隐私保护、安全计算,从而推动了隐私计算、机密计算等领域的快速发展.可信执行环境(trusted execution environment,TEE)作为机密计算服务中重要的技术基础已经广泛部署到各类计算平台中.目前,以Intel,Arm等为代表的设备制造商采用软硬件隔离机制,推出了多类实用TEE技术并不断迭代更新,从功能上更加方便设备管理者、普通用户使用安全服务.研究人员则根据不同的系统架构和应用需求,优化TEE模型,扩大可信应用领域并提升其工作效率.全面分析主流系统架构(包括x86、Arm、RISC-V、异构计算单元)中TEE技术发展路线、技术特点包括基础硬件设施设计、软件接口定义、安全边界等,挖掘TEE技术可行的应用场景.同时,分析各类TEE技术面临的挑战,探讨TEE技术局限性以及自身面临的安全风险如侧信道攻击等.在此基础上,从安全性、功能性等方面总结各类TEE技术优缺点,并提出TEE技术未来的发展思路. 展开更多
关键词 可信执行环境 操作系统架构 内存隔离 处理器模式 安全性验证
下载PDF
Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure:A Practice of Cryptography Approach
2
作者 Mingxing Zhou Peng Xiao +3 位作者 Qixu Wang Shuhua Ruan Xingshu Chen Menglong Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期957-979,共23页
Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integra... Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario.However,the openness and heterogeneity of the 6G network cause the problems of network security.To improve the trustworthiness of 6G networks,we propose a trusted computing-based approach for establishing trust relationships inmulti-cloud scenarios.The proposed method shows the relationship of trust based on dual-level verification.It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.Firstly,SM3 algorithm establishes the chain of trust for the system’s trusted boot phase.Then,the remote attestation server(RAS)of distributed cloud units verifies the physical servers.Meanwhile,the physical servers use a ring approach to verify the cloud servers.Eventually,the centralized RAS takes one-time authentication to the critical evidence information of distributed cloud unit servers.Simultaneously,the centralized RAS also verifies the evidence of distributed RAS.We establish our proposed approach in a natural OpenStack-based cloud environment.The simulation results show that the proposed method achieves higher security with less than a 1%system performance loss. 展开更多
关键词 6G multi-cloud trusted Infrastructure remote attestation commercial cipher
下载PDF
A Behavior-Based Remote Trust Attestation Model 被引量:10
3
作者 ZHANG Huanguo WANG Fan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1819-1822,共4页
While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of runni... While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of running software. Our approach is to use a behavior-based monitoring agent to make remote attestation more flexible, dynamic, and trustworthy. This approach was mostly made possible by extensive use of process information which is readily available in Unix. We also made use of a behavior tree to effectively record predictable behaviors of each process. In this paper, we primarily focus on building a prototype implementation of such framework, presenting one example built on it, successfully find potential security risks in the run time of a ftp program and then evaluate the performance of this model. 展开更多
关键词 remote attestation trusted computing trusted platform behavior monitoring agent behavior tree
下载PDF
A Method to Implement Full Anonymous Attestation for Trusted Computing Platform 被引量:3
4
作者 HAO Liming SUN Xun YANG Shutang LU Songnian 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期101-104,共4页
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by w... Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity. 展开更多
关键词 trusted computing trusted platform module direct anonymous attestation
下载PDF
A Trusted Attestation Mechanism for the Sensing Nodes of Internet of Things Based on Dynamic Trusted Measurement 被引量:10
5
作者 Bei Gong Yubo Wang +2 位作者 Xiangang Liu Fazhi Qi Zhihui Sun 《China Communications》 SCIE CSCD 2018年第2期100-121,共22页
Internet of things has been widely applied to industrial control, smart city and environmental protection, in these application scenarios, sensing node needs to make real-time response to the feedback control of the a... Internet of things has been widely applied to industrial control, smart city and environmental protection, in these application scenarios, sensing node needs to make real-time response to the feedback control of the application layer. Therefore, it is necessary to monitor whether or not awareness nodes are trusted in real time, but the existing mechanisms for trusted certification lack the real-time measurement and tracking of the sensing node. To solve the above problems,this paper proposes a dynamic metric based authentication mechanism for sensing nodes of Internet of things. Firstly, the dynamic trustworthiness measure of the sensing nodes is carried out by introducing the computational function such as the trust function, the trustworthiness risk assessment function, the feedback control function and the active function of the sensing node. The dynamic trustworthiness measure of sensing nodes from multiple dimensions can effectively describe the change of trusted value of sensing nodes. Then, on the basis of this, a trusted attestation based on node trusted measure is realized by using the revocable group signature mechanism of local verifier. The mechanism has anonymity, unforgeability and traceability, which is proved the security in the standard model. Simulationexperiments show that the proposed trusted attestation mechanism is flexible, practical and efficient and has better attack resistance. It can effectively guarantee the reliable data transmission of nodes and realize the dynamic tracking of node reliability, which has a lower impact on system performance. 展开更多
关键词 认证机制 信任证 因特网 节点 测量 计算函数 工业控制 环境保护
下载PDF
A Novel Direct Anonymous Attestation Protocol Based on Zero Knowledge Proof for Different Trusted Domains 被引量:3
6
作者 YANG Yatao CAO Lulin LI Zichen 《China Communications》 SCIE CSCD 2010年第4期172-175,共4页
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ... In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field. 展开更多
关键词 通信技术 互联网 安全协议 安全技术
下载PDF
Towards a Source-Code Oriented Attestation 被引量:1
7
作者 Ruan Anbang Shen Qingni +3 位作者 Wang Li Qin Chao Gu Liang Chen Zhong 《China Communications》 SCIE CSCD 2009年第4期82-87,共6页
关键词 计算机网络 通信 BA TCG
下载PDF
An Enhanced Direct Anonymous Attestation Scheme with Mutual Authentication for Network-Connected UAV Communication Systems 被引量:3
8
作者 Liquan Chen Sijie Qian +1 位作者 Ming Lim Shihui Wang 《China Communications》 SCIE CSCD 2018年第5期61-76,共16页
In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anony... In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anonymous attestation(DAA) is an attractive cryptographic scheme that provides an elegant balance between platform authentication and anonymity. However, because of the low-level computing capability and limited transmission bandwidth in UAV, the existing DAA schemes are not suitable for NC-UAV communication systems. In this paper, we propose an enhanced DAA scheme with mutual authentication(MA-DAA scheme), which meets the security requirements of NC-UAV communication systems. The proposed MA-DAA scheme, which is based on asymmetric pairings, bundles the identities of trusted platform module(TPM) and Host to solve the malicious module changing attacks. Credential randomization, batch proof and verification, and mutual authentication are realized in the MA-DAA scheme. The computational workload in TPM and Host is reduced in order to meet the low computation and resource requirements in TPM and Host.The entire scheme and protocols are presented,and the security and efficiency of the proposed MA-DAA scheme are proved and analyzed.Our experiment results also confirm the high efficiency of the proposed scheme. 展开更多
关键词 身份认证 通讯系统 连接网络 UAV 匿名 计算能力 安全要求 用户认证
下载PDF
SAPEM: Secure Attestation of Program Execution and Program Memory for IoT Applications
9
作者 Nasa Ahmed Manar Abu Talib Qassim Nasir 《Computers, Materials & Continua》 SCIE EI 2021年第4期23-49,共27页
Security is one of the major challenges that devices connected to the Internet of Things(IoT)face today.Remote attestation is used to measure these devices’trustworthiness on the network by measuring the device platf... Security is one of the major challenges that devices connected to the Internet of Things(IoT)face today.Remote attestation is used to measure these devices’trustworthiness on the network by measuring the device platform’s integrity.Several software-based attestation mechanisms have been proposed,but none of them can detect runtime attacks.Although some researchers have attempted to tackle these attacks,the proposed techniques require additional secured hardware parts to be integrated with the attested devices to achieve their aim.These solutions are expensive and not suitable in many cases.This paper proposes a dual attestation process,SAPEM,with two phases:static and dynamic.The static attestation phase examines the program memory of the attested device.The dynamic program ow attestation examines the execution correctness of the application code.It can detect code injection and runtime attacks that hijack the control-ow,including data attacks that affect the program control-ow.The main aim is to minimize attestation overhead while maintaining our ability to detect the specied attacks.We validated SAPEM by implementing it on Raspberry Pi using its TrustZone extension.We attested it against the specied attacks and compared its performance with the related work in the literature.The results show that SAPEM signicantly minimizes performance overhead while reliably detecting runtime attacks at the binary level. 展开更多
关键词 IOT remote attestation runtime attacks TRUST TRUSTZONE security
下载PDF
Efficient Property-Based Remote Attestation Scheme
10
作者 Zhang Yichen Li Jiguo Sun Chuanming 《China Communications》 SCIE CSCD 2012年第10期1-9,共9页
In order to ensure the security of the property-based remote attestation scheme, an improved, more efficient, formal security model of propertybased remote attestation is proposed, with which we prove that the user pl... In order to ensure the security of the property-based remote attestation scheme, an improved, more efficient, formal security model of propertybased remote attestation is proposed, with which we prove that the user platform satisfies the security property requirements predefined by a remote relying party. Under the co-Computational Diffie-Hellman (CDH) assumption, the proposed scheme is proved to be secure in the random oracle model. Compared with the existing schemes, the proposed scheme has a short property certificate and signature size, and requires less computational cost. 展开更多
关键词 安全属性 远程认证 证明 外商投资企业 随机预言模型 计算成本 模型基 CDH
下载PDF
师范认证背景下“心理学基础”课程教学新探索
11
作者 郑先如 《龙岩学院学报》 2023年第6期124-128,共5页
师范认证对培养师范类专业人才提出了新理念、新标准、新要求。“心理学基础”作为师范类专业的教育方向课程应该发挥其特有作用,课程建设必须特别重视课堂教学与实践教学两大环节,并且实现它们的积极结合。课堂教学与实践教学也是实现... 师范认证对培养师范类专业人才提出了新理念、新标准、新要求。“心理学基础”作为师范类专业的教育方向课程应该发挥其特有作用,课程建设必须特别重视课堂教学与实践教学两大环节,并且实现它们的积极结合。课堂教学与实践教学也是实现培养目标的两条路径,应着力打通它们在专业人才培养上的稳健联系,整体提升专业综合能力水平。 展开更多
关键词 师范认证 “心理学基础” 课堂教学 实践教学
下载PDF
算力网络资源管理安全架构与关键技术 被引量:1
12
作者 高凯辉 李丹 陈力 《信息通信技术》 2023年第3期13-20,共8页
算力网络作为对泛在的计算和网络资源进行灵活调度的新型信息基础设施,对数字经济的发展具有重要意义。算力网络资源管理系统维护算力资源信息并响应用户请求,是支撑算力网络的关键组件,但尚未形成体系化的安全架构,面临着重大安全威胁... 算力网络作为对泛在的计算和网络资源进行灵活调度的新型信息基础设施,对数字经济的发展具有重要意义。算力网络资源管理系统维护算力资源信息并响应用户请求,是支撑算力网络的关键组件,但尚未形成体系化的安全架构,面临着重大安全威胁。文章首先分析当前算力网络资源管理面临的安全风险,并提出算力网络资源管理安全架构,然后梳理其中的关键技术,包括算力资源安全通告协议、高效算力资源校验和算力请求安全解析机制,为算力网络安全体系的建设提供支撑。 展开更多
关键词 算力网络 安全架构 资源安全通告 远程证明 大语言模型
下载PDF
一种基于远程证明的智能制造设备群的主动防御方案
13
作者 孔维一 李昕 +2 位作者 宋永立 况博裕 付安民 《信息安全研究》 CSCD 2023年第6期580-586,共7页
随着人工智能技术的发展,智能制造已成为目前企业生产的必然选择.然而与此同时,智能制造设备群面临的安全风险也不断上升,一个被入侵的智能制造设备不仅会造成机密泄露、生产链错误等问题,还会成为攻击者的跳板进而影响整个设备群的安全... 随着人工智能技术的发展,智能制造已成为目前企业生产的必然选择.然而与此同时,智能制造设备群面临的安全风险也不断上升,一个被入侵的智能制造设备不仅会造成机密泄露、生产链错误等问题,还会成为攻击者的跳板进而影响整个设备群的安全.设计了一种基于远程证明的智能制造系统设备群的主动防御方案SecRA,以验证设备群的安全状态.SecRA对每个智能制造设备都生成独立的证明挑战,实现了网关和设备间点到点通信,保证了该主动防御方法的安全性.SecRA通过对智能制造系统中网关设备的功能扩展,完成验证者和设备之间的异步通信,以匹配现有智能制造系统网络结构.此外,SecRA基于挑战-质询的证明协议,将通信和计算开销都转移到资源丰富的网关设备,极大节省了设备端的开销.最后,仿真实验证明了SecRA主动防御方法的高效性和可行性. 展开更多
关键词 人工智能 智能制造 远程证明 群证明 主动防御
下载PDF
基于DICE的证明存储方案
14
作者 王辉 冯伟 秦宇 《计算机系统应用》 2023年第9期53-66,共14页
信息技术的不断发展和智能终端设备的普及导致全球数据存储总量持续增长,数据面临的威胁挑战也随着其重要性的凸显而日益增加,但目前部分计算设备和存储设备仍存在缺乏数据保护模块或数据保护能力较弱的问题.现有数据安全存储技术一般... 信息技术的不断发展和智能终端设备的普及导致全球数据存储总量持续增长,数据面临的威胁挑战也随着其重要性的凸显而日益增加,但目前部分计算设备和存储设备仍存在缺乏数据保护模块或数据保护能力较弱的问题.现有数据安全存储技术一般通过加密的方式实现对数据的保护,但是数据的加解密操作即数据保护过程通常都在应用设备上执行,导致应用设备遭受各类攻击时会对存储数据的安全造成威胁.针对以上问题,本文提出了一种基于DICE的物联网设备证明存储方案,利用基于轻量级信任根DICE构建的可信物联网设备为通用计算设备(统称为主机)提供安全存储服务,将数据的加解密操作移至可信物联网设备上执行,消除因主机遭受内存攻击等风险对存储数据造成的威胁.本文工作主要包括以下3方面:(1)利用信任根DICE构建可信物联网设备,为提供可信服务提供安全前提.(2)建立基于信任根DICE的远程证明机制和访问控制机制实现安全认证和安全通信信道的建立.(3)最终利用可信物联网设备为合法主机用户提供可信的安全存储服务,在实现数据安全存储的同时,兼顾隔离性和使用过程的灵活性.实验结果表明,本方案提供的安全存储服务具有较高的文件传输速率,并具备较高的安全性,可满足通用场景下的数据安全存储需求. 展开更多
关键词 物联网设备 安全存储 轻量级信任根 可信启动 远程证明
下载PDF
PIMS:An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context
15
作者 Miaomiao Yang Guosheng Huang +3 位作者 Junwei Liu Yanshuang Gui Qixu Wang Xingshu Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1879-1898,共20页
With the advantages of lightweight and high resource utilization,cloud-native technology with containers as the core is gradually becoming themainstreamtechnical architecture for information infrastructure.However,mal... With the advantages of lightweight and high resource utilization,cloud-native technology with containers as the core is gradually becoming themainstreamtechnical architecture for information infrastructure.However,malware attacks such as Doki and Symbiote threaten the container runtime’s security.Malware initiates various types of runtime anomalies based on process form(e.g.,modifying the process of a container,and opening the external ports).Fortunately,dynamic monitoring mechanisms have proven to be a feasible solution for verifying the trusted state of containers at runtime.Nevertheless,the current routine dynamic monitoring mechanisms for baseline data protection are still based on strong security assumptions.As a result,the existing dynamicmonitoringmechanismis still not practical enough.To ensure the trustworthiness of the baseline value data and,simultaneously,to achieve the integrity verification of the monitored process,we combine blockchain and trusted computing to propose a process integrity monitoring system named IPMS.Firstly,the hardware TPM 2.0 module is applied to construct a trusted security foundation for the integrity of the process code segment due to its tamper-proof feature.Then,design a new format for storing measurement logs,easily distinguishing files with the same name in different containers from log information.Meanwhile,the baseline value data is stored on the blockchain to avoidmalicious damage.Finally,trusted computing technology is used to perform fine-grained integrity measurement and remote attestation of processes in a container,detect abnormal containers in time and control them.We have implemented a prototype system and performed extensive simulation experiments to test and analyze the functionality and performance of the PIMS.Experimental results show that PIMS can accurately and efficiently detect tampered processes with only 3.57% performance loss to the container. 展开更多
关键词 Blockchain-based protection dynamic monitoring remote attestation integrity verification
下载PDF
基于区块链的域间路由策略符合性验证方法
16
作者 陈迪 邱菡 +2 位作者 朱俊虎 王清贤 樊松委 《软件学报》 EI CSCD 北大核心 2023年第9期4336-4350,共15页
域间路由系统自治域(ASes)间具有不同的商业关系和路由策略.违反自治域间出站策略协定的路由传播可能引发路由泄露,进而导致网络中断、流量窃听、链路过载等严重后果.路由策略符合性验证对于保证域间路由系统安全性和稳定性至关重要.但... 域间路由系统自治域(ASes)间具有不同的商业关系和路由策略.违反自治域间出站策略协定的路由传播可能引发路由泄露,进而导致网络中断、流量窃听、链路过载等严重后果.路由策略符合性验证对于保证域间路由系统安全性和稳定性至关重要.但自治域对本地路由策略自主配置与隐私保护的双重需求增加了验证路由策略符合性的难度,使其一直是域间路由安全领域尚未妥善解决的难点问题.提出一种基于区块链的域间路由策略符合性验证方法.该方法以区块链和密码学技术作为信任背书,使自治域能够以安全和隐私的方式发布、交互、验证和执行路由策略期望,通过生成对应路由更新的路由证明,保证路由传播过程的真实性,从而以多方协同的方式完成路由策略符合性验证.通过实现原型系统并基于真实路由数据开展实验与分析,结果表明该方法可以在不泄露自治域商业关系和本地路由策略的前提下针对路由传播出站策略符合性进行可追溯的验证,以合理的开销有效抑制策略违规路由传播,在局部部署情况下也具有显著的策略违规路由抑制能力. 展开更多
关键词 域间路由安全 区块链 路由策略符合性 路由认证
下载PDF
TCG架构下的证明问题研究及进展 被引量:7
17
作者 谭良 刘震 周明天 《电子学报》 EI CAS CSCD 北大核心 2010年第5期1105-1112,共8页
证明问题是可信计算的核心问题之一.TCG架构下的证明问题解决方案由于可扩展性差、不灵活、容易暴露平台隐私以及性能低,正在成为可信计算的应用、推广和普及的瓶颈,严重地阻碍了可信计算在更广的范围内进行延伸和拓展.介绍了证明的基... 证明问题是可信计算的核心问题之一.TCG架构下的证明问题解决方案由于可扩展性差、不灵活、容易暴露平台隐私以及性能低,正在成为可信计算的应用、推广和普及的瓶颈,严重地阻碍了可信计算在更广的范围内进行延伸和拓展.介绍了证明的基本概念并给出形式化定义,详细阐述了三元和四元证明系统的基本架构及工作机制,并指出平台身份证明采用了"推"式四元证明系统,而平台配置证明仍然采用三元证明系统.分析了当前对TCG架构下的平台身份证明、平台环境状态配置信息证明以及平台动态环境状态(运行时环境状态)证明等三个方面开展的研究工作,并对这些工作进行了总结.结合已有的研究成果,探讨了TCG架构下的证明问题的研究方向及其面临的挑战. 展开更多
关键词 可信计算 证明 平台身份证明 平台配置证明 平台运行时环境证明
下载PDF
一种可信终端运行环境远程证明方案 被引量:17
18
作者 谭良 陈菊 《软件学报》 EI CSCD 北大核心 2014年第6期1273-1290,共18页
可信终端的远程证明无论是基于二进制的证明方案还是基于属性的证明方案,针对的均是终端的静态环境,反映的是终端的软件配置结构,并不能证明终端运行环境的真正可信.针对这一问题,提出了一种终端可信环境远程证明方案.针对静态环境,该... 可信终端的远程证明无论是基于二进制的证明方案还是基于属性的证明方案,针对的均是终端的静态环境,反映的是终端的软件配置结构,并不能证明终端运行环境的真正可信.针对这一问题,提出了一种终端可信环境远程证明方案.针对静态环境,该方案考虑了满足可信平台规范的信任链以及相关软件配置的可信属性证明;针对动态环境,该方案考虑了终端行为的可信属性证明.并分别给出了信任链、平台软件配置和终端行为等属性证明的可信性判定策略和算法,以及终端运行环境远程证明的综合性判定策略和算法.另外,在Windows平台上,设计和实现了该方案中的两个核心实体:证明代理和验证代理,并设计了证明代理和验证代理之间的通信协议.最后,介绍了该方案在Windows平台上的一个典型应用案例以及证明代理在该应用实例中的性能开销.应用实例验证了该方案的可行性. 展开更多
关键词 可信计算 远程证明 属性证明 终端行为 证明代理 验证代理
下载PDF
改进的移动计算平台直接匿名证明方案 被引量:5
19
作者 杨力 张俊伟 +1 位作者 马建峰 刘志宏 《通信学报》 EI CSCD 北大核心 2013年第6期69-75,共7页
分析了Ge等人提出的直接匿名证明方案的安全缺陷,指出该方案的认证协议在用于远程证明时不能抵抗重放攻击和平台伪装攻击。提出一种改进的直接匿名证明的认证协议,引入会话密钥协商机制,增强互认证功能。分析表明,改进方案在正确进行直... 分析了Ge等人提出的直接匿名证明方案的安全缺陷,指出该方案的认证协议在用于远程证明时不能抵抗重放攻击和平台伪装攻击。提出一种改进的直接匿名证明的认证协议,引入会话密钥协商机制,增强互认证功能。分析表明,改进方案在正确进行直接匿名证明的前提下,满足不可伪造性和匿名性,能够抵抗重放攻击和平台伪装攻击,协议性能满足移动计算平台的可信验证需求。 展开更多
关键词 可信计算 远程证明 直接匿名证明 密钥协商
下载PDF
一种可控可信的匿名通信方案 被引量:12
20
作者 吴振强 周彦伟 乔子芮 《计算机学报》 EI CSCD 北大核心 2010年第9期1686-1702,共17页
加密技术只能对通信数据的内容进行保护,在电子投票、电子医疗、电子商务和电子现金等一些特殊的应用领域,用户的身份、行为、地理位置等隐私信息的保护程度是评估整个系统安全性的重要因素之一.常用的隐私保护方法是利用匿名通信技术... 加密技术只能对通信数据的内容进行保护,在电子投票、电子医疗、电子商务和电子现金等一些特殊的应用领域,用户的身份、行为、地理位置等隐私信息的保护程度是评估整个系统安全性的重要因素之一.常用的隐私保护方法是利用匿名通信技术来抵抗窃听和流量分析攻击,但匿名通信技术在增强用户身份等隐私信息保护的同时,恶意用户的身份与行为也受到了匿名保护,如何保护合法用户隐私的同时又能防止恶意行为的攻击是推动匿名通信技术大规模应用的关键.作者以增强计算机安全的可信计算技术为基础,提出一种基于可信平台模块的可控可信匿名通信系统架构,该架构通过群组通信技术实现发送方的身份匿名,在通信链路上采用加密嵌套封装的数据通信方法实现用户行为、地理位置等隐私信息的保护.利用这一框架实现的匿名通信方案是由用户向身份管理中心注册获取群组信息、通过可信性评估的用户从节点服务器下载信任节点、用户用随机选择的信任节点建立匿名通信链路、服务提供方对恶意匿名行为用户的追踪等4个功能模块组成.作者对这些模块的协议进行了体系化设计,并给出了每个模块对应的协议方案.通过对方案的安全性、可信性、匿名性、效率等方面的分析与仿真,表明该方案具有较好的安全性、可控性与可信性,可以满足未来互联网环境下大规模部署匿名通信系统的需要. 展开更多
关键词 匿名框架 匿名认证 可追踪匿名 可信平台模块 平台真实性验证
下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部