On the Concept of Trusted Computing and Software Watermarking: A Computational Complexity Treatise

被引:0
|
作者
Wu Hao [1 ]
Wu Guoqing [1 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China
关键词
Trusted computing; Trust measurement; one way function; software watermarking;
D O I
10.1016/j.phpro.2012.03.112
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Trusted computing is a new requirement of information security, after the successful modern cryptography. Although there are many developments of methods and techniques to address on the problems of trusted computing, the lack of rigorous theoretic treatment makes it hard to give further mathematical treatment. In this paper, we develop theory and concepts of trusted computing founded on computational complexity, which analogies to modern cryptography and find close connections between trusted computing and one way functions, one of the pillars of the modern cryptography. After that, we reveal that trusted computing has a subtle but deep relation with software watermarking, that concept can be found on the concept of trusted computing. (c) 2012 Published by Elsevier B.V. Selection and/or peer-review under responsibility of Garry Lee
引用
收藏
页码:465 / 474
页数:10
相关论文
共 50 条
  • [1] Is the trusted computing base concept fundamentally flawed?
    McLean, J
    1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 2 - 2
  • [2] A Test Method of Trusted Computing Supporting Software
    He, Fan
    Zhang, Huanguo
    Mei, Tang
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2330 - 2334
  • [3] Granular Computing and Computational Complexity
    Zhang, Bo
    ROUGH SET AND KNOWLEDGE TECHNOLOGY (RSKT), 2010, 6401 : 7 - 7
  • [4] Optical computing and computational complexity
    Woods, Damien
    UNCONVENTIONAL COMPUTATION, PROCEEDINGS, 2006, 4135 : 27 - 40
  • [5] On the computational complexity of conservative computing
    Mauri, G
    Leporati, A
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2003, PROCEEDINGS, 2003, 2747 : 92 - 112
  • [6] COMPUTING SOFTWARE STRUCTURAL COMPLEXITY
    ROCA, JL
    COMPUTERS & STRUCTURES, 1994, 50 (01) : 87 - 95
  • [7] An anonymous watermarking scheme for content distribution protection using trusted computing
    Leung, Adrian
    Sen Poh, Geong
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 319 - 326
  • [8] A Computational Complexity Theory in Membrane Computing
    Perez-Jimenez, Mario J.
    MEMBRANE COMPUTING, 2010, 5957 : 125 - 148
  • [9] An approach to computational complexity in membrane computing
    Pérez-Jiménez, MJ
    MEMBRANE COMPUTING, 2004, 3365 : 85 - 109
  • [10] Computational Complexity Aspects in Membrane Computing
    Mauri, Giancarlo
    Leporati, Alberto
    Porreca, Antonio E.
    Zandron, Claudio
    PROGRAMS, PROOFS, PROCESSES, 2010, 6158 : 317 - 320