Font Size: a A A

Authentication Protocol In The Trusted Computing Improve The Program

Posted on:2010-03-29Degree:MasterType:Thesis
Country:ChinaCandidate:W J ShenFull Text:PDF
GTID:2208360275991338Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Trusted computing facilitates to strengthen the security of platform,finishing tasks in a more secure approach.Attestation protocol is crucial due to its coherence to the security and soundness of trusted platform.Attestaion consists of general attestation and property-based attestation.Attestation is an interactive onen between trusted platform and chanllenger in which platform proves its trustness to chanllenger.Based on platform configuration, general attestation enjoys wide applications.While coding with some scenario such as frequent platform updating,the general attestation schema will fail.Property-based attestation protocol can solve the issue mentioned above,which is a complementary and improvement on general attestation.Encounting increasingly complex network topology and situation,to enhance the security and efficiency merits deep insight and study.The paper focuses on the existing general attestation schema and property-based counterpart.Many underlying attackes have been investigated.Consequently some deficiency and security issues of existing schema have been discovered.The existing general attestation protocols have many interactive rounds and are prone to concurrent attackes.Property-based one contains security issue.The paper studies the issues mentioned above.Some improvement strategies are presented and an improved attestation protocol and an enhanced property-based scheme with strong security and high efficiency are followed by,employing some cryptographics tools including non-malleable zero-knowledge protocol and adaptive chosen cipher text attack resistant signature schema,blind signature schema.These enhanced schemas solve the existing issues and are proved to be non-meallable zero-knowledge against concurrent attacks coupled with high effiency.
Keywords/Search Tags:zero-knowledge protocol, Σprotocol, Ωprotocol, trusted computing, non-malleability, attestation
PDF Full Text Request
Related items