Journal on Communications ›› 2013, Vol. 34 ›› Issue (6): 69-75.doi: 10.3969/j.issn.1000-436X.2013.06.008

• paper • Previous Articles     Next Articles

Improved direct anonymous attestation scheme for mobile computing platforms

Li YANG,Jun-wei ZHANG,Jian-feng MA,Zhi-hong LIU   

  1. School of Computer Science & Technology,Xidian University,Xi'an 710071,China
  • Online:2013-06-25 Published:2017-07-20
  • Supported by:
    The Program for Changjiang Scholars and Innovative Research Team in University;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Natural Science Basic Research Plan in Shaanxi Province of China;The Natural Science Basic Research Plan in Shaanxi Province of China;The Natural Science Basic Research Plan in Shaanxi Province of China;The Natural Science Basic Research Plan in Shaanxi Province of China;The Natural Science Basic Research Plan in Shaanxi Province of China

Abstract:

The security flaws of a direct anonymous attestation scheme proposed by Ge,et al.Were analyzed,and the re-sult shows that the authentication protocol of the scheme is vulnerable to reply attacks and platform masquerade attacks when being used for remote attestation.An improved direct anonymous attestation authentication scheme with the in-volvement of key agreement was proposed to provide the property of mutual authentication.The analysis shows that the proposal can realize direct anonymous attestation with the properties of forgery-resistance and anonymity,and resist reply attacks and platform masquerade attacks; the scheme is effective and suitable for the mobile trusted computing platforms.

Key words: trusted computing, remote attestation, direct anonymity attestation, key agreement

No Suggested Reading articles found!