A Signature Scheme Based Trusted Computing Plat

被引:0
|
作者
Jiao, Hongqiang [1 ]
Zhang, Yanjun [1 ]
Li, Hui [1 ]
机构
[1] Handan Coll, Handan, Peoples R China
关键词
Trusted Computing; signature; bilinear pairings; security;
D O I
10.1109/MINES.2009.45
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper propose a signature scheme based Trusted Computing Platform with two secret keys, while, using smarty card for enhancing the security of the system. For preventing from tampering with the information on public channel, the information and the signature will be encrypted with one-time padding system by the user and signatory. Finally, the article finishes correctness confirmation and security analysis for the scheme.
引用
收藏
页码:356 / 359
页数:4
相关论文
共 50 条
  • [1] Efficient and Secure Multi-Signature Scheme Based on Trusted Computing
    HAO Liming1
    2.School of Information Security Engineering
    WuhanUniversityJournalofNaturalSciences, 2008, (02) : 180 - 184
  • [2] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [3] Password management scheme based on trusted computing
    National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
    Beijing Youdian Daxue Xuebao, 2008, 5 (93-97):
  • [4] Trusted Computing Based Mobile DRM Authentication Scheme
    Yang, Zhen
    Fan, Kefeng
    Lai, Yingxu
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
  • [5] ID-based signature scheme without trusted PKG
    Liao, J
    Xiao, JF
    Qi, YH
    Huang, PW
    Rong, MT
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 53 - 62
  • [6] A signature scheme based on the intractability of computing roots
    Biehl, I
    Buchmann, J
    Hamdy, S
    Meyer, A
    DESIGNS CODES AND CRYPTOGRAPHY, 2002, 25 (03) : 223 - 236
  • [7] A Signature Scheme Based on the Intractability of Computing Roots
    Ingrid Biehl
    Johannes Buchmann
    Safuat Hamdy
    Andreas Meyer
    Designs, Codes and Cryptography, 2002, 25 : 223 - 236
  • [8] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [9] An Improved Scheme of μTESLA Authentication based Trusted Computing Platform
    Du, Ruiying
    Wen, Song
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4711 - 4714
  • [10] The trust measurement scheme in trusted computing
    Zhang, Li-Qiang
    Zhang, Huan-Guo
    Zhang, Fan
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 586 - 591