首页 | 本学科首页   官方微博 | 高级检索  
     

支持验证代理方的远程证明模型及其安全协议
引用本文:张志勇,裴庆祺,杨林,马建峰.支持验证代理方的远程证明模型及其安全协议[J].西安电子科技大学学报,2009,36(1):58-63.
作者姓名:张志勇  裴庆祺  杨林  马建峰
作者单位:(1. 西安电子科技大学 计算机网络与信息安全教育部重点实验室,陕西 西安 710071; 2. 河南科技大学 电子信息工程学院,河南 洛阳 471003; 3. 中国电子设备系统工程公司 研究所,北京 100039)
基金项目:国家自然科学基金,国家自然科学基金重点项目,高等学校学科创新引智计划 
摘    要:针对现有的远程证明模型中存在的终端平台基本配置细节与安全属性特征等隐私的保护问题,提出了一种具有委托模式的支持验证代理方的远程证明模型(AP2RA)及其安全协议.引入可信第3方接受验证方的委托,实施终端软硬件的完整性和安全性证明,并可信地报告平台当前状态的布尔值,改进了基于验证双方的远程证明模式,有效地保护了被验证方的平台隐私.与已有的方案相比,该方案能够抵抗被验证方消息重放攻击和共谋攻击,以及追踪对验证代理方(APP)发起攻击的终端平台,适用于可信网络中的资源分发与信息共享等环境.

关 键 词:可信计算  远程证明  隐私保护  安全协议  
收稿时间:2007-11-09

Attestation proxy party-supported remote attestation model and its secure protocol
ZHANG Zhi-yong,PEI Qing-qi,YANG Lin,MA Jian-feng.Attestation proxy party-supported remote attestation model and its secure protocol[J].Journal of Xidian University,2009,36(1):58-63.
Authors:ZHANG Zhi-yong  PEI Qing-qi  YANG Lin  MA Jian-feng
Affiliation:(1. Ministry of Education Key Lab. of Computer Network and Information Security, Xidian Univ., Xi’an 710071, China;2. Electron. Inf. Eng. Coll., Henan Univ. of Sci. & Technol., Luoyang 471003, China;3. The Research Inst., China Electron. Equ. & Sys. Eng. Corp, Beijing 100039, China) ;
Abstract:Since existing remote attestation models lead to an issue of privacy protection of basic configuration details and security attribute features of the terminal platform, an Attestation Proxy Party-supported Remote Attestation (abbr.AP2RA) model and its secure protocol, which have a delegation mode, are presented. The Trusted Third Party is introduced to accept an attestion delegation from the Attestor Party, implements integrity and security attestation of hardware and software on the terminal, and further trustworthily reports the boolean value of the current platform status, thus improving the remote attestation model based on two parties, as well as effectivly protecting the platform privacy of the Attested Party. Moreover, compared with other approaches, the proposed approach is capable of resisting against the message replay attack and collusion attack from the Attested Party together with the tracing terminal platform sponsoring attack on APP, so that it is suitable for resource dissemination and information sharing in the trusted network.
Keywords:trusted computing  remote attestation  privacy protection  secure protocol  
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《西安电子科技大学学报》浏览原始摘要信息
点击此处可从《西安电子科技大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号