Pairings in Trusted Computing

被引:0
|
作者
Chen, Liqun [1 ]
Morrissey, Paul [2 ]
Smart, Nigel P. [2 ]
机构
[1] Hewlett Packard Labs, Filton Rd, Bristol BS34 8QZ, Avon, England
[2] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
来源
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly simplified or expanded using the mathematical structures of different types of pairings. In this paper we consider another advanced application of pairings, namely to the Direct Anonymous Attestation (DAA) schemes as found in the Trusted Computing Group standards. We show that a recent DAA proposal can be further optimized by transferring the underlying pairing groups from the symmetric to the asymmetric settings. This provides a more efficient and scalable solution than the existing RSA and pairing based DAA schemes.
引用
下载
收藏
页码:1 / +
页数:3
相关论文
共 50 条
  • [41] Researches to the Trusted Ubiquitous Computing
    Sun, Daoqing
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 433 - 437
  • [42] Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing
    HUANG Qiang1
    2. Naval Institute of Computing Technology
    3. College of Information Technical Science
    Wuhan University Journal of Natural Sciences, 2007, (01) : 13 - 16
  • [43] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
    Kim, Mooseop
    Ju, Hongil
    Kim, Youngsae
    Park, Jiman
    Park, Youngsoo
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (01) : 134 - 140
  • [44] Building trusted sub-domain for the Grid with trusted computing
    Zhan, Jing
    Zhang, Huanguo
    Yan, Fei
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 463 - +
  • [45] TRUSTED ILLIAC:: A configurable hardware framework for a trusted computing base
    Iyer, Ravishankar K.
    HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2007, : 3 - 3
  • [46] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
    Kim, Mooseop
    Kim, Youngsae
    Ju, Hongil
    Park, Youngsoo
    2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
  • [47] Trusted code remote execution through trusted computing and virtualization
    Zhang, Liqiang
    Chen, Lu
    Zhang, Huanguo
    Yan, Fei
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 39 - +
  • [48] Enforcing trust in pervasive computing with trusted computing technology
    Li, Shiqun
    Balfe, Shane
    Zhou, Jianying
    Chen, Kefei
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
  • [49] Computing Hypercrossed Complex Pairings in Digital Images
    Oztunc, Simge
    Mutlu, Ali
    Bildik, Necdet
    ABSTRACT AND APPLIED ANALYSIS, 2013,
  • [50] The Trusted Computing exemplary with Astonishing Security for Cloud Computing
    Devi, Ramya M.
    Balamurugan, P. S.
    Thanushkodi, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 206 - 209