Pairings in Trusted Computing

被引:0
|
作者
Chen, Liqun [1 ]
Morrissey, Paul [2 ]
Smart, Nigel P. [2 ]
机构
[1] Hewlett Packard Labs, Filton Rd, Bristol BS34 8QZ, Avon, England
[2] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
来源
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly simplified or expanded using the mathematical structures of different types of pairings. In this paper we consider another advanced application of pairings, namely to the Direct Anonymous Attestation (DAA) schemes as found in the Trusted Computing Group standards. We show that a recent DAA proposal can be further optimized by transferring the underlying pairing groups from the symmetric to the asymmetric settings. This provides a more efficient and scalable solution than the existing RSA and pairing based DAA schemes.
引用
下载
收藏
页码:1 / +
页数:3
相关论文
共 50 条
  • [1] Challenges for Trusted Computing
    Sadeghi, Ahmad-Reza
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414
  • [2] Privacy and trusted computing
    Reid, J
    Nieto, JMG
    Dawson, E
    Okamoto, E
    14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 383 - 388
  • [3] Pervasive Trusted Computing
    Balfe, Shane
    Li, Shiqun
    Zhou, Jianying
    SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 88 - +
  • [4] Trusted computing in context
    Schneider, Fred B.
    IEEE SECURITY & PRIVACY, 2007, 5 (02) : 4 - 5
  • [5] Trusted computing for infrastructure
    1600, Telefonaktiebolaget L.M. Ericsson (91):
  • [6] Modeling Trusted Computing
    CHEN Shuyi
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1507 - 1510
  • [7] Trusted computing, or the gatekeeper
    Kursawe, K
    Wolf, C
    INFORMATION SOCIETY: EMERGING LANDSCAPES, 2006, 195 : 339 - +
  • [8] Trusted computing and communications
    Wang, Guojun
    Yang, Laurence T.
    Sakurai, Kouichi
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 1 - 2
  • [9] Challenges for Trusted Computing
    Balfe, Shane
    Gallery, Eimear
    Mitchell, Chris J.
    Paterson, Kenneth G.
    IEEE SECURITY & PRIVACY, 2008, 6 (06) : 60 - 66
  • [10] TRUSTED COMPUTING UPDATE
    ABRAMS, MD
    JOYCE, MV
    COMPUTERS & SECURITY, 1995, 14 (01) : 57 - 68