首页 | 本学科首页   官方微博 | 高级检索  
     

可信计算环境下基于TPM的认证密钥协商协议
引用本文:王海燕,吴振强,种慧芳,蒋李. 可信计算环境下基于TPM的认证密钥协商协议[J]. 计算机工程与应用, 2010, 46(35): 115-118. DOI: 10.3778/j.issn.1002-8331.2010.35.033
作者姓名:王海燕  吴振强  种慧芳  蒋李
作者单位:陕西师范大学 计算机科学学院,西安 710062
基金项目:国家自然科学基金,西安电子科技大学计算机网络与信息安全教育部重点实验室开放课题
摘    要:基于身份的认证密钥协商协议存在密钥托管、ID管理、ID唯一性和私钥的安全分发等问题,目前的可信计算技术为此提供了很好的解决方案。利用TPM平台中EK和tpmproof唯一性的特点,结合McCullagh-Barreto认证密钥协商协议思想,提出了一个在可信计算环境下基于TPM的认证密钥协商协议,该协议较好地解决了上述基于身份的密钥协商协议所存在的问题。用CK模型对所提协议进行了安全性分析,结果表明该协议具备已知密钥安全性,完善前向保密性及密钥泄露安全性等CK安全模型下相应的安全属性。

关 键 词:可信计算  密钥协商协议  认证密钥协商  Canetti-Krawczyk模型  
收稿时间:2009-04-20
修稿时间:2009-6-16 

TPM-based authenticated key agreement protocol in trusted computing
WANG Hai-yan,WU Zhen-qiang,CHONG Hui-fang,JIANG Li. TPM-based authenticated key agreement protocol in trusted computing[J]. Computer Engineering and Applications, 2010, 46(35): 115-118. DOI: 10.3778/j.issn.1002-8331.2010.35.033
Authors:WANG Hai-yan  WU Zhen-qiang  CHONG Hui-fang  JIANG Li
Affiliation:College of Computer Science,Shaanxi Normal University,Xi’an 710062,China
Abstract:There are some inherent problems in the identity-based authenticated key agreement protocol:key escrowi,dentity management,unique identity values and secure channel to distribution private key.At present,trusted computing technology provide a good method to solve these problems.With the characteristics of EK and tpmproof keys in the TPM platformc,om-bining with McCullagh-Barreto authenticated key agreement protocolt,he paper proposes a TPM platform based authenticated key agreement protocol in trusted computingt,he protocol provide a better solution to the above mentioned problems of the identity-based authenticated key agreement protocol.Especiallyt,he security properties of the protocol are analyzed in detail in Canetti-Krawczyk model.The results indicate that the protocol has the corresponding security attributes in CK security model such as known key security,perfect forward secrecy,key-compromise impersonation.
Keywords:trusted computing  key agreement protocol  authenticated key agreement  Canetti-Krawczyk model
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号