Pairings in Trusted Computing

被引:0
|
作者
Chen, Liqun [1 ]
Morrissey, Paul [2 ]
Smart, Nigel P. [2 ]
机构
[1] Hewlett Packard Labs, Filton Rd, Bristol BS34 8QZ, Avon, England
[2] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
来源
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly simplified or expanded using the mathematical structures of different types of pairings. In this paper we consider another advanced application of pairings, namely to the Direct Anonymous Attestation (DAA) schemes as found in the Trusted Computing Group standards. We show that a recent DAA proposal can be further optimized by transferring the underlying pairing groups from the symmetric to the asymmetric settings. This provides a more efficient and scalable solution than the existing RSA and pairing based DAA schemes.
引用
下载
收藏
页码:1 / +
页数:3
相关论文
共 50 条
  • [31] TOCTOU, traps, and trusted computing
    Bratus, Sergey
    D'Cunha, Nihal
    Sparks, Evan
    Smith, Sean W.
    TRUSTED COMPUTING - CHALLENGES AND APPLICATIONS, PROCEEDINGS, 2008, 4968 : 14 - 32
  • [32] Autonomic and trusted computing paradigms
    Li, Xiaolin
    Kang, Hui
    Harrington, Patrick
    Thomas, Johnson
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 143 - 152
  • [33] Reconfigurable Trusted Computing in Hardware
    Eisenbarth, Thomas
    Gueneysu, Tim
    Paar, Christof
    Sadeghi, Ahmad-Reza
    Schellekens, Dries
    Wolf, Marko
    STC'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SCALABLE TRUSTED COMPUTING, 2007, : 15 - 20
  • [34] Advances in trusted network computing
    Wu, Yulei
    Wang, Guojun
    Al-Dubai, Ahmed
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (09) : 1311 - 1312
  • [35] Trusted Environments for Volunteer Computing
    Ianni, Michele
    Masciari, Elio
    2018 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2018, : 526 - 529
  • [36] A cluster of patterns for trusted computing
    Eduardo B. Fernandez
    Antonio Muñoz
    International Journal of Information Security, 2025, 24 (1)
  • [37] Trusted computing for automotive systems
    Bogdanov, A.
    Eisenbarth, T.
    Wolf, M.
    Wollinger, T.
    AUTOMOTIVE SECURITY, 2007, 2016 : 227 - 237
  • [38] A Trusted Portable Computing Device
    Fang Ming-wei
    Wu Jun-jun
    Yu Peng-fei
    Zhang Xin-fang
    INTERNATIONAL CONFERENCE ON SOLID STATE DEVICES AND MATERIALS SCIENCE, 2012, 25 : 1027 - 1033
  • [39] Trusted Computing: Security and Applications
    Gallery, Eimear
    Mitchell, Chris J.
    CRYPTOLOGIA, 2009, 33 (03) : 217 - 245
  • [40] Special Section: Trusted computing
    Xiang, Yang
    Zhou, Wanlei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2011, 27 (05): : 527 - 528