An E-commerce Anonymous Attestation Model Based on Trusted Computing Theory

被引:0
|
作者
Qu Youtian [1 ]
Zhong Lili [1 ]
Zou Huilai [1 ]
Liu Hua [1 ]
机构
[1] Zhejiang Normal Univ, Coll Math Phys & Informat Engn, Jinhua, Peoples R China
来源
NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III | 2010年
关键词
e-commerce; trusted computing; attestation; DAA; anonymous;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
In this paper, the authors analyze the shortages exist in e-commerce's traditional security authentication model, aiming at these shortages, the authors introduce trusted computing theory into this paper, and use TPM chip as a trusted root can report the current environment and identify the user and system safely, thus ensuring the security of terminal platform; meanwhile, to some extent, direct anonymous attestation scheme based on trusted computing can replace CA, providing authentication function in e-commerce to make sure both dealer' identity and customer's are credible. The authors also extent this attestation scheme model into multi-domain, making different dealers in different trusted domain can do business more convenient, and meet the security requirements and anonymity.
引用
收藏
页码:356 / 361
页数:6
相关论文
共 50 条
  • [21] Trusted operating systems for e-commerce applications
    Zhou Xing
    Xie Qingsheng
    Xu Mingheng
    Proceedings of e-ENGDET2006, 2006, : 100 - 103
  • [22] Analysis and Research of Remote Attestation Based on Trusted Computing
    Guo, Jiaming
    Wei, Jiang
    2013 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL MANUFACTURING AND AUTOMATION (ICDMA), 2013, : 192 - 195
  • [23] A secure anonymous authorisation architecture for e-commerce
    Au, WKR
    Choo, KKR
    Looi, M
    2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, Proceedings, 2005, : 106 - 111
  • [24] A Trusted Third Party Based Secure Authentication Scheme of E-Commerce
    Zhang Longjun
    Zou Tao
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 590 - 594
  • [25] A CORBA-based approach for conducting trusted E-commerce transactions
    Chowdhry, BS
    Sial, MY
    PROCEEDINGS OF THE WORLD ENGINEERS' CONVENTION 2004, VOL A, NETWORK ENGINEERING AND INFORMATION SOCIETY, 2004, : 143 - 147
  • [26] Trusted Computing Dynamic Attestation by Using Static Analysis based Behavior Model
    Yu, Fajiang
    Tang, Xianglei
    Yu, Yue
    Li, Tong
    Yang, Tong
    2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 1 - 6
  • [27] Property Based Attestation and Trusted Computing: Analysis and Challenges
    Nagarajan, Aarthi
    Varadharajan, Vijay
    Hitchens, Michael
    Gallery, Eimear
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 278 - +
  • [28] A delegation based cross trusted domain direct anonymous attestation scheme
    Yang, Li
    Ma, Jianfeng
    Lou, Wenjing
    Jiang, Qi
    COMPUTER NETWORKS, 2015, 81 : 245 - 257
  • [29] Research on direct anonymous attestation scheme based on trusted mobile platform
    Yang, Bo
    Feng, Dengguo
    Qin, Yu
    Zhang, Qianying
    Xi, Li
    Zheng, Changwen
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (07): : 1436 - 1445
  • [30] How to Cope with Fraud of Trusted Third Party in E-commerce An analysis based on evolutionary game theory
    Chen, Shouming
    Zhang, Bin
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL I, 2009, : 61 - 64