Font Size: a A A

Research On Anonymous Authentication Of Trusted Computing Platform

Posted on:2009-08-27Degree:MasterType:Thesis
Country:ChinaCandidate:R Y DingFull Text:PDF
GTID:2178360245480423Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, the problem of information security becomes more and more complicated. Trusted computing platform is a computer soft hardware entity to solve the hidden trouble of information security, which makes people pay more and more attention to it. Anonymity authentication is an important function of trusted computing platform, and it is used to deal with an issue of personal privacy. In this paper, anonymity authentication of trusted computing platform is studied deeply and the main work is as follows:The structure and functions of trusted computing platform is understood deeply. Especially, methods, supposed conditions, authentication models, security and so on which are used in typical anonymous authentication schemes for trusted computing platform are studied. And then their advantages and disadvantages are also analyzed.Based on related mathematics knowledge, number theory assumption and cryptoragraph knowledge, a simple and high-efficient anonymous authentication scheme for trusted computing platform is proposed with knowledge signature. And deficiencies of the scheme which He Ge proposed in 2005 are solved. This scheme can be seen as a group signature without opening capability, but can identifys the rogue trusted platform models.This scheme satisfies forgery-resistance, anonymity and revocation under strong RSA assumption and DDH assumption.After studying related knowledge for anonymous authentication and distributed system, an anonymous authentication scheme for trusted computing platform is constructed, which can be used in star distributed system. Request for service authorized is divided from detection for rogue TPM in this scheme, so anonymous authentication efficiency is immense rised. If a detector for rogue TPM colludes with TPM, the verifier of request for service authorized will prove his illegal behavior under his signature and anonymous authentication information. Securities of this scheme are analysed finally.
Keywords/Search Tags:Anonymous Authentication, Trusted Computing Platform, Trusted Platform Model, Distributed System
PDF Full Text Request
Related items