Font Size: a A A

Anonymous Authentication Based On Proxy Ring Signature Research

Posted on:2013-04-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y L WangFull Text:PDF
GTID:2248330374459738Subject:Computer technology
Abstract/Summary:PDF Full Text Request
It has been recognized for several years that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard trusted computing technologies promises a revolution in this respect. It provides a root of trust upon which secure applications can be developed. And based on the root of trust, we build a terminal which can make the whole system safe and credible. For people’s demands for privacy protection are continually increasing, people now not only want to accomplish the basic identity authentication, but also want to make their personal identity information not disclosed. The anonymous authentication technology in trusted computing can achieve the people’s requirement. Trusted computing group (TCG) released two standard schemes about anonymous authentication:Privacy CA (Privacy Certification Authority) scheme and DAA (Direct Anonymous Attention) scheme. But the trusted third party which the Privacy CA scheme is based on becomes a bottleneck in the whole scheme; the authentication process in DAA scheme is very complicated and it has a high calculation.In this thesis, we show the concept of trusted computing first, and then introduce the basic knowledge of cryptography and digital signature. On this basis, we talk about the anonymous authentication of the trusted computing, and further analyze the performance&security of Privacy CA scheme and DAA scheme in detail. After that, we put forward a new anonymous attestation scheme based on proxy ring signature which is different from Privacy CA and DAA, to achieve the anonymous attestation under trusted computing environment. At last, the whole design thought of a anonymous electronic voting protocol based on the new direct anonymous attention scheme was proposed.
Keywords/Search Tags:trusted computing, trusted anonymous attestation, ring signature, proxy ring signature, anonymous electronic voting system, TPM
PDF Full Text Request
Related items