Font Size: a A A

Research And Application Based On The Trusted Platform Anonymous Authentication Scheme

Posted on:2014-07-17Degree:MasterType:Thesis
Country:ChinaCandidate:L LiuFull Text:PDF
GTID:2268330392473346Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, more and more information security issues in front of us. Trusted computing technology get the increasing amount of concern and research which as a new way of thinking to solve information security problems. Remote attestation technology is a key issue for trusted computing research field. We are talking about remote attestation technology is started as a user of the remote platform and platform configuration, status, and other information be verified to confirm. However, due to manufacturing reasons for TPM, the privacy of users in the process of remote attestation by the great security challenges. How to implement remote attestation of trusted platform without leakage own privacy? Anonymous authentication is a good solution to this problem. Trusted computing organizations has been adopted direct anonymous attestation (DAA) programmer to achieve the anonymous authentication of the Platform identity, but the programmer is not perfect, there are some problems, such as no cross-domain authentication.This paper is based on anonymous authentication technology of the trusted computing platform for research, for its shortcomings, presented a cross-domain anonymous authentication scheme based on DAA which is enabling trusted platform cross-domain authentication. Theprogram can be achieved not only cross-domain authentication, but also anonymous authentication key agreement protocol with the train of thought what anonymous authentication is used. The main contents are:1) Fordirect anonymous attestation (DAA) programmer cannot be effectively achieving anonymous authentication between different trust domains, this paper presents a direct anonymous attestation mechanism that can across multiple trust domains. In this paper, not only introduce the detailed design of the direct anonymous attestation between different trust domains scheme, but analyze and prove the security of the programmer. Analysis of certification, the programmer meets strong anonymity, not forged and high reliability products security property requirements.2) Research the thought and way method which the anonymous certification is used, we can apply it to the key negotiation protocols, achieve a TPM basedauthentication key agreement protocolwith one-way anonymous.The protocolnot only has a range of key agreement protocol security properties, but also the communication party members without revealing the true identity of the premise to verify each other with some kind of membership. In addition, improve and perfect the protocol to devise a two-way anonymous authenticated key agreement protocol based on TPM, realization of bi-directional anonymous authentication for key agreement protocol.3) Build a virtual trusted platform environment, using TPM-Emulator simulation of some features of the TPM chip, in a simulated environment to achieve credible anonymous authentication scheme.
Keywords/Search Tags:trusted computing, anonymous authentication, key agreement protocol, knowledge proof
PDF Full Text Request
Related items