【摘 要】
:
Direct Anonymous Attestation (DAA) is a cryptographic scheme which enables the remote authentication of a trusted platform whilst preserving privacy under the user’s control.DAA,as an attractive crypt
【机 构】
:
College of information science and engineering Northeastern University Shenyang, China
论文部分内容阅读
Direct Anonymous Attestation (DAA) is a cryptographic scheme which enables the remote authentication of a trusted platform whilst preserving privacy under the user’s control.DAA,as an attractive cryptographic primitive,has drawn a lot of attentions from both industry and researchers.At present,the main researches focus on the study of the security model and efficient construction of DAA.However,the existing DAA security model cannot adequately capture the security requirements of DAA,and may bring about insecure DAA schemes following this model.In term of construction of DAA,due to the limited computational and storage capability of trusted platform module (TPM),numbers of efficient DAA schemes have recently been worked out and require much less TPM resources than the one used by Trusted Computing Group (TCG),but how to design a more efficient DAA scheme is still a challenge.Therefore,in this paper,we first present the enhanced security model for DAA,in which more precise security notions demanded from DAA are defined than that in any previous model.Then we propose a novel approach for constructing an efficient DAA scheme: we design a secure two-party computation protocol for the Join/Issue protocol of DAA,and construct the DAA scheme concretely under the q-SDH assumption,DL assumption and XDH assumption.Based on the enhanced security model,we prove that our DAA scheme meets user-controlled anonymity,user-controlled traceability and non-frameability in the random oracle model.Finally compared with other existing DAA schemes,our DAA scheme has better performance.
其他文献
The P2P (peer-to-peer) has been widely used in file sharing,online chatting,peer computing,etc.Network traffic generated by P2P applications makes up of a large portion of the overall Internet traffic
Communication systems utilize the Distributed Hash Table (DHT) approach to build the network infrastructure for advantages of even distribution of workload,high scalability and cost-effectiveness.Alth
The Internet is designed to bypass failures by rerouting around connectivity outages.Consequently,dynamical redistribution of loads may result in congestion in other networks.Due to the co-location of
The existing methods of policy refinement in computer network defense (CND) can only support the refinement of access control policy,but not the policies of protection,detection,response,and recovery.
Recently,the Graphics Processing Unit (GPU) has been proved to be an exciting new platform for high-performance software routers.On such a platform,designing efficient IP lookup engine is a challengin
As one of the three service models of cloud computing,PaaS (Platform as a Service) has gained more and more popularity for its capabilities in optimizing development productivity and business agility.
Conflict detection is an important issue of the Access Control Policy.Most conflict detection tools mainly focus on the two rules that have contrary actions,but there are also other rules which are ne
Large networks are always partitioned into several small networks when deploying software defined networks (SDN),and a dedicated network operating system (NOS) is deployed for each network.Each NOS ha
Although there are many access control models having been developed and applied in various environments,few of them have addressed the issue of managing information access control in the combined cont
We designed and implemented a traffic analyze framework TraSt (Traffic Statistics) based on tcpdump for Android.This framework can get more detailed traffic usage than any other existing traffic monit