期刊文献+

基于代理多签名的模块属性远程证明协议

MODULE ATTRIBUTE REMOTE ATTESTATION PROTOCOL BASED ON PROXY MULTI-SIGNATURE
在线阅读 下载PDF
导出
摘要 为了解决当前远程证明方案中安全性差、效率低的问题,提出一种基于椭圆曲线离散对数难题的代理多签名的模块属性远程证明协议。该协议在构建模块签名时采用代理多签名方式,简化了签名验证的过程,提高了远程证明的效率;而且采用基于椭圆曲线数字签名算法,大大提高了模块的安全性。通过实验验证了协议的可行性。实验结果表明,该方案可以快速生成可信平台中各模块的签名,提高了远程证明的效率。同时该方案具有安全性、隐私性和不可伪造性。 In order to solve the problem of poor security and low efficiency in current remote attestation schemes, we propose a module attribute remote attestation protocol with proxy multi-signature, which is based on elliptic curve discrete logarithm problem.In the protocol, the proxy multi-signature is used to build the modules signature, which simplifies the process of signature verification and enhances the efficiency of remote attestation.And to use elliptic curve digital signature-based algorithm greatly improves the safety of the module.The feasibility of the protocol is verified through experiment.Experimental results show that the scheme can quickly generate the signatures of each module in trusted platform, improves the efficiency of remote attestation.Meanwhile, the security, privacy and unforgeability of the scheme are satisfied.
出处 《计算机应用与软件》 CSCD 北大核心 2014年第12期314-317,共4页 Computer Applications and Software
基金 山西省自然科学基金项目(2009011022-2) 山西省留学基金项目(2009-28)
关键词 可信计算 远程证明 代理多签名 模块 椭圆曲线数字签名 Trusted computing Remote attestation Proxy multi-signature Module Elliptic curve digital signature
  • 相关文献

参考文献9

  • 1Liang Gu,Guangdong Bai,Yao Guo,et al.Security model oriented attestation on dynamically reconfigurable component-based systems[J].Journal of Network and Computer Applications,2012,35(2012):974-981.
  • 2Wenjuan Xu,Xinwen Zhang,Hongxin Hu,et al.Remote Attestation with Domain-Based Integrity Model and Policy Analysis[J].IEEE Transactions on Dependable and Secure Computing,2012,9(3):429-441.
  • 3SHEN ChangXiang,ZHANG HuanGuo,WANG HuaiMin,WANG Ji,ZHAO Bo,YAN Fei,YU FaJiang,ZHANG LiQiang,XU MingDi.Research on trusted computing and its development[J].Science China(Information Sciences),2010,53(3):405-433. 被引量:38
  • 4Cataldo Basile,Stefano Di Carlo,Alberto Scionti,et al.FPGA-Based Remote-Code Integrity Verification of Programs in Distributed Embedded Systems[J].FPGA-Based Remote-Code Integrity Verification of Programs in Distributed Embedded Systems,2012,42(2):187-199.
  • 5Ernie Brickell,Jiangtao Li.Enhanced Privacy ID:A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities[J].IEEE Transactions on Dependable and Secure Computing,2012,9(3):345-359.
  • 6Aarthi Nagarajan,Vijay Varadharajan.Dynamic trust enhanced security model for trusted platform based services[J].Future Generation Computer Systems,2011,27(5):564-573.
  • 7池亚平,李志鹏,魏占祯,方勇.可信计算授权协议分析与改进[J].哈尔滨工业大学学报,2012,44(3):119-122. 被引量:2
  • 8沈晴霓,杜虹,文汉,卿斯汉.一种基于完整性度量架构的数据封装方法[J].计算机研究与发展,2012,49(1):210-216. 被引量:6
  • 9逯玲娜,周梦.基于椭圆曲线的代理多重签名的改进方案[J].盐城工学院学报(自然科学版),2011,24(1):48-50. 被引量:1

二级参考文献33

  • 1武丹,李善庆.基于椭圆曲线的代理数字签名和代理多重签名[J].浙江大学学报(理学版),2005,32(1):39-41. 被引量:5
  • 2杨爱梅,彭维平,李子臣.改进的基于椭圆曲线的代理数字签名和代理多重签名[J].网络安全技术与应用,2006(5):88-89. 被引量:1
  • 3中国国家密码管理局.可信计算密码支撑平台功能与接口与规范[EB/OL].(2007-12-29)[2007-12-29].http:∥www.oscca.gov.cn/Doc/6/News_1132.htm.
  • 4Mambo M,Usuda k,Okamoto E.Proxy signatures:Delegation of the power to sign message[J].IEICE Trans,Fundamentals,1996,E79-A(9):1338-1354.
  • 5S Kim,S park and D.Won proxy signatures,revisited[A].Proc.of ICICS97,International.Conference on Information and Communications Security[C].LNCE,1334,1997:223-232.
  • 6Trusted Computing Group. TPM Main Specification Level 2 Version 1.2, Revision 103 [EB/OL]. [2011-02-19]. http:// www. trustedcomputinggroup, org/resources/tpm, main specification.
  • 7Sailer R, Doorn L, Ward J. The role of TPM in enterprise security, RC23363 [OL]. [ 2011-02-19 ]. http://www. oscca, gov. cn/Doe/6/News_1132, htm.
  • 8Poritz J, Schunter M, van Herreweghen E, et al. Property attestation scalable and privacy-friendly security assessment of peer computers, RZ 3548 [R]. New York: IBM Research, 2004.
  • 9Ktihn U, Kursawe K, Lucks S, et al. Secure data management in trusted computing [G] //LNCS 3659: Proc of the Workshop on Cryptographic Hardware and Embedded Systems (CHES). Berlin: Springer, 2005:324-338.
  • 10Kiahn U, Selhorst M, Stible C. Realizing property-based attestation and sealing with commonly available hard and software [C] //Proc of the 2007 ACM Workshop on Scalable Trusted Computing. New York: ACM, 2007:50-57.

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部