Font Size: a A A

Based On Anonymous Authentication, One-time Public Key

Posted on:2012-04-24Degree:MasterType:Thesis
Country:ChinaCandidate:J GuoFull Text:PDF
GTID:2218330338455965Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the popularization of computer application, the network technology has permeated all aspects of people's life. In practice, people found that to ensure the safety of the terminal are more and more important with information security developing. Trusted computing is put forward based on this idea, it begins to ensure the user's safety and credibility from the terminal. And it will upload this safety and credibility to its upper level's application until it reaches the entire system. For people's privacy protection consciousness increasing, they not only want to accomplish the identity authentication, which is the core technology of the trusted computing, but also want to protect personal identity information. Trusted computing group TCG issues two authentication standard:Privacy CA scheme and DAA scheme. But Privacy CA scheme which is based on the trusted third party has a bottleneck problem; DAA scheme which is based on zero knowledge signature has a complicated authentication process.In this paper, I put forward a anonymous certification scheme of trusted computing based on improved one-off public key which is different from Privacy C A and DAA. One-off public key has a key management problem and the security is not very well, so in this paper I have used the CPK technology with independent intellectual property of china to expand the one-off public key system's key space and improve the safety of the new scheme. Trough the reconstruction of the one-off public key, the new scheme can realize the direct and credible anonymous authentication of trusted computing. At last, the whole design thought of a foodstuff impeaching system based on the new direct anonymous attention scheme was proposed.
Keywords/Search Tags:trusted computing, trusted anonymous attestation, one-off public key, combined public key(CPK), electronic impeaching system
PDF Full Text Request
Related items