首页 | 本学科首页   官方微博 | 高级检索  
     检索      

A Method to Implement Full Anonymous Attestation for Trusted Computing Platform
作者姓名:HAO  Liming  SUN  Xun  YANG  Shutang  LU  Songnian
作者单位:School of Electronic, Information and Electrical Engineering,Shanghai Jiao Tong University, Shanghai 200240, China
基金项目:Foundation item: Supported by the National High Technology Research and Development Program of China (2005AA 145110)
摘    要:Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity.

关 键 词:计算机  安全保密  加密工作  安全协议
文章编号:1007-1202(2007)01-0101-04
收稿时间:2006-04-22

A method to implement full anonymous attestation for trusted computing platform
HAO Liming SUN Xun YANG Shutang LU Songnian.A Method to Implement Full Anonymous Attestation for Trusted Computing Platform[J].Wuhan University Journal of Natural Sciences,2007,12(1):101-104.
Authors:Hao Liming  Sun Xun  Yang Shutang  Lu Songnian
Institution:(1) School of Electronic, Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China
Abstract:Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform’s real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform’s identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM’s real identity. Biography: HAO Liming (1982–), male, Ph. D. candidate, research direction: trust management in P2P system.
Keywords:trusted computing  trusted platform module  direct anonymous attestation
本文献已被 CNKI 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号