The Chinese specification for trusted computing, which has similar functions with those defined by the Trusted Computing Group (TCG), has adopted a different cryptography scheme. Applications designed for the TCG sp...The Chinese specification for trusted computing, which has similar functions with those defined by the Trusted Computing Group (TCG), has adopted a different cryptography scheme. Applications designed for the TCG specifications cannot directly function on platforms complying with Chinese specifications because the two cryptography schemes are not compatible with each other. In order to transplant those applications with little to no modification, the paper presents a formal compatibility model based on Zaremski and Wing's type system. Our model is concerned not only on the syntactic compatibility for data type, but also on the semantic compatibility for cryptographic attributes according to the feature of trusted computing. A compatibility algorithm is proposed based on the model to generate adapters for trusted computing applications.展开更多
Two multiparty simultaneous quantum identity authentication(MSQIA)protocols based on secret sharing are presented.All the users can be authenticated by a trusted third party(TTP)simultaneously.In the first protocol,th...Two multiparty simultaneous quantum identity authentication(MSQIA)protocols based on secret sharing are presented.All the users can be authenticated by a trusted third party(TTP)simultaneously.In the first protocol,the TTP shares a random key K with all the users using quantum secret sharing.The ith share acts as the authentication key of the ith user.When it is necessary to perform MSQIA,the TTP generates a random number R secretly and sends a sequence of single photons encoded with K and R to all the users.According to his share,each user performs the corresponding unitary operations on the single photon sequence sequentially.At last,the TTP can judge whether the impersonator exists.The sec-ond protocol is a modified version with a circular structure.The two protocols can be efficiently used for MSQIA in a network.They are feasible with current technol-ogy.展开更多
基金Supported by the National High Technology Research and Development Plan of China (863 Program) (2006AA01Z440)the National Basic Research Program of China (973 Program) (2007CB311100)
文摘The Chinese specification for trusted computing, which has similar functions with those defined by the Trusted Computing Group (TCG), has adopted a different cryptography scheme. Applications designed for the TCG specifications cannot directly function on platforms complying with Chinese specifications because the two cryptography schemes are not compatible with each other. In order to transplant those applications with little to no modification, the paper presents a formal compatibility model based on Zaremski and Wing's type system. Our model is concerned not only on the syntactic compatibility for data type, but also on the semantic compatibility for cryptographic attributes according to the feature of trusted computing. A compatibility algorithm is proposed based on the model to generate adapters for trusted computing applications.
基金the National Basic Research Program of China(973 Program)(Grant No.2007CB311100)the National High Technology Research and Development Program of China(Grant Nos.2006AA01Z419 and 20060101Z4015)+5 种基金the Major Research Plan of the National Natural Science Foundation of China(Grant No.90604023)the Scientific Research Common Program of Beijing Municipal Commission of Education(Grant No.KM200810005004)the Scientific Research Foundation for the Youth of Beijing University of Technology(Grant No.97007016200701)the National Research Foundation for the Doctoral Program of Higher Education of China(Grant No.20040013007)the National Laboratory for Modern Communications Science Foundation of China(Grant No.9140C1101010601)the Doctor Scientific Research Activation Foundation of Beijing University of Technology(Grant No.52007016200702)
文摘Two multiparty simultaneous quantum identity authentication(MSQIA)protocols based on secret sharing are presented.All the users can be authenticated by a trusted third party(TTP)simultaneously.In the first protocol,the TTP shares a random key K with all the users using quantum secret sharing.The ith share acts as the authentication key of the ith user.When it is necessary to perform MSQIA,the TTP generates a random number R secretly and sends a sequence of single photons encoded with K and R to all the users.According to his share,each user performs the corresponding unitary operations on the single photon sequence sequentially.At last,the TTP can judge whether the impersonator exists.The sec-ond protocol is a modified version with a circular structure.The two protocols can be efficiently used for MSQIA in a network.They are feasible with current technol-ogy.