首页> 外文期刊>Wuhan University Journal of Natural Sciences >A Method to Implement Full Anonymous Attestation for Trusted Computing Platform
【24h】

A Method to Implement Full Anonymous Attestation for Trusted Computing Platform

机译:一种用于可信计算平台的完全匿名证明的方法

获取原文
获取原文并翻译 | 示例
       

摘要

Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approachto ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity.
机译:可信计算组(TCG)推出了可信计算(TC)技术,以使计算安全可靠。证明是TCG指定的一项主要功能,这是受信任的计算机确保平台不受篡改的远程计算机的方式。在不公开平台真实身份的情况下,有两种实现认证的协议是基于隐私CA的协议和直接匿名认证(DAA)协议。但是,在第一个协议中,隐私CA是瓶颈,如果隐私CA受到威胁,则将公开平台的身份,而DAA协议在处理恶意硬件设备时可以进行概要分析。在本文中,我们提出了一种DAA扩展的新方法,以确保完全匿名证明,该证明不仅可以检测到恶意TPM,而且可以揭示恶意TPM的真实身份。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号