Pairings in Trusted Computing

被引:0
|
作者
Chen, Liqun [1 ]
Morrissey, Paul [2 ]
Smart, Nigel P. [2 ]
机构
[1] Hewlett Packard Labs, Filton Rd, Bristol BS34 8QZ, Avon, England
[2] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
来源
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly simplified or expanded using the mathematical structures of different types of pairings. In this paper we consider another advanced application of pairings, namely to the Direct Anonymous Attestation (DAA) schemes as found in the Trusted Computing Group standards. We show that a recent DAA proposal can be further optimized by transferring the underlying pairing groups from the symmetric to the asymmetric settings. This provides a more efficient and scalable solution than the existing RSA and pairing based DAA schemes.
引用
下载
收藏
页码:1 / +
页数:3
相关论文
共 50 条
  • [21] Experiences in Trusted Cloud Computing
    Oliver, Ian
    Holtmanns, Silke
    Miche, Yoan
    Lal, Shankar
    Hippelainen, Leo
    Kalliola, Aapo
    Ravidas, Sowmya
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 19 - 30
  • [22] TRUSTED COMPUTING AND INFORMATION SECURITY
    张焕国
    MU Yi
    China Communications, 2013, 10 (11) : 11 - 12
  • [23] Experiences in Trusted Cloud Computing
    Oliver, Ian (ian.oliver@nokia-bell-labs.com), 2018, River Publishers (06):
  • [24] Trusted Computing: An Elusive Goal
    Michael, James Bret
    COMPUTER, 2015, 48 (03) : 99 - 101
  • [25] Trusted Computing: Challenges & Solutions
    Awang, Nor Fatimah Bt
    COMPUTING & INFORMATICS, 2009, : 434 - 438
  • [26] Trusted Logging for Grid Computing
    Huh, Jun Ho
    Martin, Andrew
    APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 30 - 42
  • [27] How trustworthy is trusted computing?
    Vaughan-Nichols, SJ
    COMPUTER, 2003, 36 (03) : 18 - 20
  • [28] High Time for Trusted Computing
    Potter, Bruce
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 54 - 56
  • [29] The trusted computing exemplar project
    Irvine, CE
    Levin, TE
    Nguyen, TD
    Dinolt, GW
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 109 - 115
  • [30] Development of Trusted Computing Research
    ZHANG Huanguo~ 1
    2. State Key Laboratory of Software Engineering
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1407 - 1413