针对可信移动平台(Trusted Mobile Platform,TMP)远程认证方式中直接匿名证明方案存在的性能瓶颈、R攻击以及跨信任域问题,提出了一种新型的具有用户可控关联性的匿名证明(Anonymous Attestation with User-controlled-linkability,TMP-...针对可信移动平台(Trusted Mobile Platform,TMP)远程认证方式中直接匿名证明方案存在的性能瓶颈、R攻击以及跨信任域问题,提出了一种新型的具有用户可控关联性的匿名证明(Anonymous Attestation with User-controlled-linkability,TMP-UAA)方案.通过引入可信第三方CA构建了方案的模型,该模型可以有效解决传统直接匿名证明设计中存在的R攻击和跨信任域问题,且易于部署实现.根据提出的方案模型,首先利用Paillier加密系统及可验证加密技术设计了一个安全两方计算协议,该协议用于实现TPM-UAA方案中的Join协议;其次运用该协议并结合提出的l-MSDH假设和XDH假设给出了方案的具体设计;然后在随机预言模型下对方案的安全性进行了证明,证明表明该方案满足用户可控匿名性以及用户可控可追踪性;此外在性能方面与现有直接匿名证明方案相比,该方案具有更短的签名长度以及更高的计算效率;最后阐述了TPM-UAA方案在可信移动环境下的跨域证明,该证明避免了传统直接匿名证明存在的跨信任域及R攻击问题.展开更多
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by w...Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity.展开更多
Trusted computing(TC)is an emerging technology to enhance the security of various computing platforms by a dedicated secure chip(TPM/TCM),which is widely accepted by both the industrial and academic world.This paper a...Trusted computing(TC)is an emerging technology to enhance the security of various computing platforms by a dedicated secure chip(TPM/TCM),which is widely accepted by both the industrial and academic world.This paper attempts to sketch the evolution of TC from the view of our theoretical and engineering work.In theory,we focus on protocol design and security analysis.We have proposed the first ECDAA protocol scheme based on q-SDH assumption,which highlights a new way to design direct anonymous attestation scheme.In technical evolution,we discuss the key technologies of trust chain,trusted network connection and TC testing and evaluation.We break through several key technologies such as trusted boot,OS measurement and remote attestation,and implement a TC system from TPM/TCM to network.We also design and implement a testing and evaluation system of TC platform,which is the first one put into practical application in China.Finally,with the rapid development of cloud computing and mobile applications,TC is moving toward some new directions,such as the trust in cloud and mobile environments,new TPM standard,and flexible trust execution environment trust establishment method.展开更多
文摘针对可信移动平台(Trusted Mobile Platform,TMP)远程认证方式中直接匿名证明方案存在的性能瓶颈、R攻击以及跨信任域问题,提出了一种新型的具有用户可控关联性的匿名证明(Anonymous Attestation with User-controlled-linkability,TMP-UAA)方案.通过引入可信第三方CA构建了方案的模型,该模型可以有效解决传统直接匿名证明设计中存在的R攻击和跨信任域问题,且易于部署实现.根据提出的方案模型,首先利用Paillier加密系统及可验证加密技术设计了一个安全两方计算协议,该协议用于实现TPM-UAA方案中的Join协议;其次运用该协议并结合提出的l-MSDH假设和XDH假设给出了方案的具体设计;然后在随机预言模型下对方案的安全性进行了证明,证明表明该方案满足用户可控匿名性以及用户可控可追踪性;此外在性能方面与现有直接匿名证明方案相比,该方案具有更短的签名长度以及更高的计算效率;最后阐述了TPM-UAA方案在可信移动环境下的跨域证明,该证明避免了传统直接匿名证明存在的跨信任域及R攻击问题.
基金Supported by the National High Technology Research and Development Program of China (2005AA145110)
文摘Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity.
基金supported by the National BasicResearch Program of China(2013CB338003)the National Natural Science Foundation of China(91118006 and 61202414)
文摘Trusted computing(TC)is an emerging technology to enhance the security of various computing platforms by a dedicated secure chip(TPM/TCM),which is widely accepted by both the industrial and academic world.This paper attempts to sketch the evolution of TC from the view of our theoretical and engineering work.In theory,we focus on protocol design and security analysis.We have proposed the first ECDAA protocol scheme based on q-SDH assumption,which highlights a new way to design direct anonymous attestation scheme.In technical evolution,we discuss the key technologies of trust chain,trusted network connection and TC testing and evaluation.We break through several key technologies such as trusted boot,OS measurement and remote attestation,and implement a TC system from TPM/TCM to network.We also design and implement a testing and evaluation system of TC platform,which is the first one put into practical application in China.Finally,with the rapid development of cloud computing and mobile applications,TC is moving toward some new directions,such as the trust in cloud and mobile environments,new TPM standard,and flexible trust execution environment trust establishment method.