一种新颖的基于零知识证明的跨域DAA协议(英文)

来源 :中国通信 | 被引量 : 0次 | 上传用户:davidrandy
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field. In order to solve the issue that existing direct anonymous attendant (DAA) scheme can not operate effectively in different domains, based on the original DAA scheme, a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed, in which, the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly .Our designed mechanism accords with present trusted computing group (TCG) international specification, and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently .Compared with present DAA scheme, in our protocol, the anonymity, unforgeability can be guaranteed, and the replay-attack also can be avoided. It hasten referenced and practical application value in trusted computing field.
其他文献
Unsupervised anomaly detection can detect attacks without the need for clean or labeled training data.This paper studies the application of clustering to unsupe
《赢的答案》【美】杰克.韦尔奇苏茜.韦尔奇著中信出版社该书中收录了74个商业难题,是杰克.韦尔奇在《赢》一书推出之后,在与读者的持续交流中深入分 “Winning the answer
究竟是需求创造供给,还是供给创造需求,这个“先有鸡还是先有蛋”的问题,正是长期以来困扰经济学家的一大难题。两个欧洲人到非洲去推销皮鞋。由于天气炎热,非洲人向来都是打
三年了,与朋友们朝夕为伴,月月相见,咱们的交情也不算浅啦。难怪那多情又心急的读者总是嚷嚷,爱你们 Three years, and friends from day to night companionship, moon and
期刊
本文主要从图书馆在数据安全方面的实际经验教训为依据,根据自身的工作经验,指出由数据备份、数据管理、软硬件更新方面的错误行为、不良习惯而引起的各种数据安全问题及其后
随着科技的不断发展,在计算机网络安全领域里,都存在着诸多因素的脆弱性和潜在的威胁。计算机网络的风险主要由网络系统存在的缺陷或漏洞及外界环境,病毒攻击黑客时网络的威
所谓经济可特续发展:是一种合理经济发展形态通过实施可持续发展战略,使社会经济得以形成可持续经济发展模式。 The so-called sustainable development of the economy can
目前治疗三叉神经痛的方法以药物治疗为首选,在药物治疗无效时才考虑其他治疗方法,但神经阻滞、射频、减压术等都为有创性治疗,创伤大,并发症多,有死亡的风险存在,年老体弱患
肝片吸虫(Fasciola hepatica)是寄生于牛、羊等哺乳动物胆道中的大型吸虫,人偶尔感染。笔者于2005年报告肝片吸虫病1例[1],2008年又在相同地点一农户家庭发现2例肝片吸虫病例
各区、县级市人民政府,市府直属各单位:《广州政报》1995年的征订发行工作在市领导的关心指导下,在各区、县级市政府和市属委、办、局(总公司)领导以及各单位政报联系人的大