A Signature Scheme Based Trusted Computing Plat

被引:0
|
作者
Jiao, Hongqiang [1 ]
Zhang, Yanjun [1 ]
Li, Hui [1 ]
机构
[1] Handan Coll, Handan, Peoples R China
来源
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS | 2009年
关键词
Trusted Computing; signature; bilinear pairings; security;
D O I
10.1109/MINES.2009.45
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper propose a signature scheme based Trusted Computing Platform with two secret keys, while, using smarty card for enhancing the security of the system. For preventing from tampering with the information on public channel, the information and the signature will be encrypted with one-time padding system by the user and signatory. Finally, the article finishes correctness confirmation and security analysis for the scheme.
引用
收藏
页码:356 / 359
页数:4
相关论文
共 50 条
  • [21] ECC-Based Threshold Digital Signature Scheme without a Trusted Party
    Pei, Qingqi
    Ma, Jianfeng
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 851 - 855
  • [22] A trusted group signature architecture in virtual computing environment
    Zou, Deqing
    Li, Yunfa
    Wu, Song
    Qiang, Weizhong
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 73 - 85
  • [23] An enhanced scheme of enforcing DTE security policy based on trusted computing technology
    Liu, Wei-Peng
    Zuo, Xiao-Dong
    Huang, Qiang
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3657 - +
  • [24] A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing
    Li, Ying
    Du, Liping
    Zhao, Guifen
    Feng, Fuwei
    INTELLIGENCE SCIENCE AND BIG DATA ENGINEERING: BIG DATA AND MACHINE LEARNING TECHNIQUES, ISCIDE 2015, PT II, 2015, 9243 : 407 - 412
  • [25] A Portable TPM Scheme for General-purpose Trusted Computing Based on EFI
    Han, Lei
    Liu, Jiqiang
    Zhang, Dawei
    Han, Zhen
    Wei, Xueye
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 140 - +
  • [26] An efficient anonymous remote attestation scheme for trusted computing based on improved CPK
    Yu Fajiang
    Chen Jing
    Xiang Yang
    Zhu Jiacheng
    Zhao Yangdi
    ELECTRONIC COMMERCE RESEARCH, 2019, 19 (03) : 689 - 718
  • [27] A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment
    Liu, Zewei
    Hu, Chunqiang
    Li, Ruinian
    Xiang, Tao
    Li, Xingwang
    Yu, Jiguo
    Xia, Hui
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2325 - 2336
  • [28] An efficient anonymous remote attestation scheme for trusted computing based on improved CPK
    Yu Fajiang
    Chen Jing
    Xiang Yang
    Zhu Jiacheng
    Zhao Yangdi
    Electronic Commerce Research, 2019, 19 : 689 - 718
  • [29] Scheme for (T, N) threshold ID-based signature without a trusted dealer
    Cai, Yong-Quan
    Zhang, Ke
    2007 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1-4, PROCEEDINGS, 2007, : 1341 - 1345
  • [30] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509