期刊文献+

支持组件动态更新的远程证明 被引量:2

Key-insulated component property-based attestation
在线阅读 下载PDF
导出
摘要 将密钥隔离安全机制应用到基于组件属性的远程证明中,并分析方案的正确性和安全性.分析结果表明:未及时更新或者被恶意代码攻击的组件将丧失安全属性,不再具有远程证明能力.实现了无证书的组件证明,省略了验证证书的过程,减少了验证方的负担,并结合现有的可信计算完整性管理模式,给出了实现过程. This paper applies the mechanism of Key-insulated security to the component property-based attestation and analyzes the correction and security of the scheme.The analysis shows that the component which has not been updated or attacked by the malicious code will lose the security property,and would not have the ability of remote attestation.This paper implements the certificateless component property based attestation,which eliminates the process of verifying the certificate,reduces the burden of the verifier,and gives the implementation process by combining with the existing integrity management model of trusted computing.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2011年第4期11-19,共9页 Journal of Xidian University
基金 国家自然科学基金资助项目(60973135) 信息安全国家重点实验室资助项目
关键词 可信计算 远程证明 密钥隔离 双线性映射 trusted computing remote attestation Key-insulated security mechanism
  • 相关文献

参考文献14

  • 1Trusted Computing Group. TNC Architecture for Interoperability Version 1.4, Revision 4 [ EB/OL]. [ 2009-08-04]. http:// www. trustedcomputinggroup, org/files/resouree_files/51 F9691E-1 D09-3519-AD1 C1 E27 D285 F03 B/TNC _Architecture_vl _4 _r4. pdf.
  • 2TCG Infrastructure Working Group. Infrastructure Work Group Reference Architecture for Interoperability Specification ( Part 1), Version 1.0 [ EB/OL]. [ 2009-12-22]. http://www, trustedcomputinggroup, org/files/resourcefiles/8770A217-1DO9-3519- AD17543BF6163205/IWG_Architecture_vl _0_rl. pdf.
  • 3Dierks T, Rescorla E. The Transport Layer Security (TLS) Protocol Version 1.1 [ EB/OL]. [ 2009-07-09]. http://www, ieff. org/rfc/rfc,4346, txt? number = 4346.
  • 4Kent S, Seo K. Security Architecture for the Internet Protocol[ EB/OL]. [ 2009-12-23]. http://www, ieff. org/rfc/rfc2401, txt.
  • 5Chen L Q, Landfermann R, Lohr H, et al. A Protocol for Property-base Attestation [ C]//Proceedings of the First ACM Workshop On Scalable Trusted Computing. New York: ACM Press, 2006: 7-16.
  • 6Poritz J, Schunter M, Herreweghen E V, et al. Property Attestation-Scalable and Privacy-friendly Security Assessment of Peer Computers, RZ3548[ R]. Switzerland: IBM Zurich Research Laboratory, 2004.
  • 7Sadeghi A, Stable C. Property-based Attestation for Computing Platforms: Caring About Properties, Not Mechanisms [ C]// Proceedings of the New Security Paradigms Workshop. New York: ACM Press, 2004: 67-77.
  • 8Kuhn U, Selhorst M, Stueble C. Realizing Property-based Attestation and Sealing with Commonly Available Hard and Software [ C]//Proceedings of the Scalable Trusted Computing. New York: ACM Press, 2007: 50-57.
  • 9Chen L Q, Lohr H, Manulis M, et al. Property-based Attestation without a Trusted Third Party [ C]//ISC 2008, Lecture Notes in Computer Science: Vol 5222. Berlin: Springer-Verlag, 2008: 31-46.
  • 10秦宇,冯登国.基于组件属性的远程证明[J].软件学报,2009,20(6):1625-1641. 被引量:33

二级参考文献39

  • 1TCG Group. TPM main part l, design principles specification. Version 1.2. 2003. https://www.trustedcomputinggroup.org/home.
  • 2TCG Group. TCG architecture overview specification. 2004. https://www.trustedcomputinggroup.org/home.
  • 3TCG Group. TCG software stack (TSS) specification. Version 1.10. 2003. https://www.trustedcomputinggroup.org.
  • 4Sailer R, Zhang XL, Jaeger T, Doom LV. Design and implementation of a TCG-based integrity measurement architecture. In: Proc. of the 13th Usenix Security Symp. San Diego: Usenix Press, 2004. 16-16.
  • 5Smith S. Trusted Computing Platforms--Design and Applications. New York: Springer-Verlag, 2005. 193-194.
  • 6Seshadri A, Perrig A, Doom LV, Khosla P. SWATT: Software-Based attestation for embedded devices. In: Proc. of the IEEE Security & Privacy Conf. Oakland: IEEE Press, 2004. 272-282.
  • 7Garfinkel T, Rosenblum M, Boneh D. Flexible OS support and applications for trusted computing. In: Proc. of the 9th Workshop on Hot Topics in, Operating Systems (HotOS IX). Hawaii: Usenix Association, 2003.25-25.
  • 8Haldar V, Chandra D, Franz M. Semantic remote attestation: A virtual machine directed approach to trusted computing. In: Proc. of the USENIX Virtual Machine Research and Technology Syrup. San Jose: Usenix Press, 2004.29-41.
  • 9Poritz J, Schunter M, Herreweghen EV, Waidner M. Property attestation--Scalable and privacy-friendly security assessment of peer computers. IBM Research Report, RZ 3548, 2004.
  • 10Sadeghi A, St(ible C. Property-Based attestation for computing platforms: Caring about properties, not mechanisms. In: Proc. of the New Security Paradigms Workshop. Nova Scotia: ACM Press, 2004. 67-77.

共引文献61

同被引文献12

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部