A Signature Scheme Based Trusted Computing Plat

被引:0
|
作者
Jiao, Hongqiang [1 ]
Zhang, Yanjun [1 ]
Li, Hui [1 ]
机构
[1] Handan Coll, Handan, Peoples R China
来源
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS | 2009年
关键词
Trusted Computing; signature; bilinear pairings; security;
D O I
10.1109/MINES.2009.45
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper propose a signature scheme based Trusted Computing Platform with two secret keys, while, using smarty card for enhancing the security of the system. For preventing from tampering with the information on public channel, the information and the signature will be encrypted with one-time padding system by the user and signatory. Finally, the article finishes correctness confirmation and security analysis for the scheme.
引用
收藏
页码:356 / 359
页数:4
相关论文
共 50 条
  • [31] Research on trusted storage based on trusted computing platform
    School of Computer, Wuhan University, Wuhan 430072, China
    不详
    Tongxin Xuebao, 2007, SUPPL. (117-120):
  • [32] Proxy signature scheme with a semi-trusted third party
    Liu Peiyu
    Cui Tao
    Xu Mingying
    CEIS 2011, 2011, 15
  • [33] A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
    Wang Xingfu
    Lu Qiwei
    Xiong Yan
    Miao Fuyou
    Huang Wenchao
    Liu Tao
    Wu Xuangou
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) : 284 - 290
  • [34] Secure VANETs: Trusted Communication Scheme between Vehicles and Infrastructure Based on Fog Computing
    Arif, Muhammad
    Wang, Guojun
    Balas, Valentina Emilia
    STUDIES IN INFORMATICS AND CONTROL, 2018, 27 (02): : 235 - 246
  • [35] A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
    WANG Xingfu
    LU Qiwei
    XIONG Yan
    MIAO Fuyou
    HUANG Wenchao
    LIU Tao
    WU Xuangou
    Chinese Journal of Electronics, 2014, 23 (02) : 284 - 290
  • [36] Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator
    Xiangjun Xin
    Li Ding
    Qinglan Yang
    Chaoyang Li
    Tianyuan Zhang
    Yongxuan Sang
    Quantum Information Processing, 21
  • [37] Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator
    Xin, Xiangjun
    Ding, Li
    Yang, Qinglan
    Li, Chaoyang
    Zhang, Tianyuan
    Sang, Yongxuan
    QUANTUM INFORMATION PROCESSING, 2022, 21 (07)
  • [38] Parallel Key Isolation Aggregate Signature Scheme Based on Edge Computing
    Zhou L.-F.
    Yin X.-C.
    Ning J.-T.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2024, 52 (03): : 1002 - 1015
  • [39] WLAN Mesh security association scheme in trusted computing environment
    Xiao, Yue-Lei
    Wang, Yu-Min
    Pang, Liao-Jun
    Tan, Shi-Chong
    Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 94 - 103
  • [40] Integrity Measurement based on Trusted Computing
    Li, Yiming
    Ba, Haihe
    Ren, Jiangchun
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2015, 21 : 956 - 959