Journal on Communications ›› 2014, Vol. 35 ›› Issue (8): 94-106.doi: 10.3969/j.issn.1000-436x.2014.08.013

• Academic paper • Previous Articles     Next Articles

Research of platform identity attestation based on trusted chip

Qian-ying ZHANG1,2,Deng-guo FENG1,Shi-jun ZHAO1,2   

  1. 1 Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
    2 University of Chinese Academy of Sciences, Beijing 100049, China
  • Online:2014-08-25 Published:2017-06-29
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Basic Research Pro-gram of China (973 Program)

Abstract:

By studying the platform identity attestation base on trusted third parties, a scheme where a trusted computing platform is identified by a certificate and a token is proposed. In this scheme, only the token is used when the platform proves its identity. Compared to other schemes, this scheme not only has much lower calculation and communication, but also convinces the verifier of the trustworthiness of the client's platform state during the platform identity attestation. A detailed security proof of the proposed scheme is presented by using the protocol composition logic, and the proof shows that the scheme satisfies correctness and anonymity of platform identity verification. The experiment result in a devel-oped prototype system shows that the proposed scheme provides good performances in computation and communication, and is especially suitable for the wireless network.

Key words: trusted computing, platform identity attestation, protocol composition logic, anonymity

No Suggested Reading articles found!