An Improved Protocol for Property-Based Attestation

被引:0
|
作者
Li Jianjun [1 ]
Li Yingjia [2 ]
Hu Yajun [1 ]
Wang Honglv [1 ]
Liu Weiwei [2 ]
机构
[1] China Tobacco Zhejiang Ind Co Ltd, Hangzhou 310009, Zhejiang, Peoples R China
[2] Beijing Univ Technol, Beijing 100124, Peoples R China
关键词
Trusted computing; Remote attestation; Property-based remote attestation; CL-LRSW signature;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an important part of Trusted Computing, remote attestation is an effective mechanism to convince trust among computing platforms in open network environment. Existing property-based attestation has a lot of shortcoming. Aiming at the problems of low signing efficiency, high complexity of platform configuration validation and platform identity leakage in property-based attestation PBA protocol, a improved PBA scheme is proposed in this paper. A message group CL-LRSW signature scheme is proposed based on bilinear map to promote the efficiency in the original scheme with the feature of short signature size, high compute efficiency and high secure level. In signing process, Schnorr's signature scheme is adopted to overcome the defect of zero knowledge signature algorithms. Moreover the AIK algorithm is replaced with DAA algorithm so the combination of PBA and DAA will meet their optimum. In this case the anonymity and privacy of platform identity is assured at the same time. The PBA scheme proposed both adopt the bilinear map which can be realized effectively based on chinese trusted cryptography module(TCM). The practical application of TCM is promoted on some extent by our schemes.
引用
收藏
页码:6343 / 6348
页数:6
相关论文
共 6 条
  • [1] Brickell E, ENHANCED PRIVACY ID
  • [2] Camenisch J, 2003, LECT NOTES COMPUT SC, V2576, P268
  • [3] Chen Liqun, 2008, 11 INT C ISC 2008 TA, P31
  • [4] Chen Liqun., 2006, STC 06 P 1 ACM WORKS, P7, DOI DOI 10.1044/SBI7.2.13
  • [5] Lin CD, 2008, 2008 IEEE INTERNATIONAL CONFERENCE ON MULTISENSOR FUSION AND INTEGRATION FOR INTELLIGENT SYSTEMS, VOLS 1 AND 2, P1
  • [6] Sadeghi A., 2004, Proceedings of the 2004 workshop on New security paradigms, P66