Font Size: a A A

Protocol Of Safe And Efficient Remote Attestation Based On Signcryption

Posted on:2015-05-20Degree:MasterType:Thesis
Country:ChinaCandidate:L HeFull Text:PDF
GTID:2298330434958741Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of social informationalization, computer technology and information technology are developing rapidly. This rapid development has greatly changed people’s way of life. Today, if you leave your computer and the network, or other electronic devices, you will not be able to live a normal life and work. Information plays an important role in our lives. But any technology is a double-edged sword, IT is no exception. With the extended use of IT, hazardous events caused by information security are constantly occurring, for example, hacker attack, malicious software, the use of various types of computer crime. These pose a serious threat to the security of information. While using the information technology which brings the interests, we are bearing the harm in the aspect of information security.The concept of Trusted Computing can be used to solve some of the problems in the field of information security. It has brought a new way of thinking. We can add hardware modules (such as the Trusted Platform Module) to the computer platform, then the platform will have the function of self-protection and platform detection. We can build a trusted computing platform by combining software(trusted software stack)and hardware(Trusted Platform Module). Trusted computing platform has the function of ensuring data integrity, data security storage and remote attestation, Secure communication problems between platforms can be solved by the technology of remote attestation in trusted computing.Binary-based remote attestation in trusted computing report the information about the trusted computing platform to the verifier. This is likely to cause the leakage of the platform information, and at the same time, the workload is heavy. The property-based remote attestation just need to report the relevant attribute certificate to the verifier. This overcomes the shortcomings of the binary-based remote attestation. However, if the attribute certificate exposed in the insecure network environment, its security is difficult to be guaranteed. If the signing and encrypting for the certificates is divided into two steps, it will be low efficiency. We propose a module-level safe and efficient property attestation protocol which using the technology of signcryption. In the protocol, the signcryption is used to build the module property signature, which can reduce the time of building property certificate. And the signcryption scheme based on the bilinear pairings over elliptic curves also enhances the security of property certificate. Finally a model instance is presented to verify the feasibility of the protocol. The experiment is with Ubuntull.10operating system. Trusted Platform Module is implemented by the TPM Emulator. Trusted Software Stack is implemented by the jTSS. We use Java language in the experiment. In the experiment we implement a prototype of remote attestation protocol based on the signcryption and verify the feasibility of the protocol.
Keywords/Search Tags:trusted computing, remote attestation, module, Digitalsigncryption
PDF Full Text Request
Related items