您的位置: 专家智库 > >

国家自然科学基金(61202414)

作品数:2 被引量:9H指数:2
发文基金:国家自然科学基金国家重点基础研究发展计划更多>>
相关领域:自动化与计算机技术电子电信更多>>

文献类型

  • 2篇中文期刊文章

领域

  • 1篇电子电信
  • 1篇自动化与计算...

主题

  • 2篇TPM
  • 1篇匿名
  • 1篇匿名认证
  • 1篇物理资源
  • 1篇芯片
  • 1篇密钥管理
  • 1篇敏感数据
  • 1篇可信计算
  • 1篇安全芯片
  • 1篇TCM
  • 1篇TRUSTE...
  • 1篇API
  • 1篇APIS

传媒

  • 2篇Scienc...

年份

  • 2篇2014
2 条 记 录,以下是 1-2
排序方式:
The theory and practice in the evolution of trusted computing被引量:5
2014年
Trusted computing(TC)is an emerging technology to enhance the security of various computing platforms by a dedicated secure chip(TPM/TCM),which is widely accepted by both the industrial and academic world.This paper attempts to sketch the evolution of TC from the view of our theoretical and engineering work.In theory,we focus on protocol design and security analysis.We have proposed the first ECDAA protocol scheme based on q-SDH assumption,which highlights a new way to design direct anonymous attestation scheme.In technical evolution,we discuss the key technologies of trust chain,trusted network connection and TC testing and evaluation.We break through several key technologies such as trusted boot,OS measurement and remote attestation,and implement a TC system from TPM/TCM to network.We also design and implement a testing and evaluation system of TC platform,which is the first one put into practical application in China.Finally,with the rapid development of cloud computing and mobile applications,TC is moving toward some new directions,such as the trust in cloud and mobile environments,new TPM standard,and flexible trust execution environment trust establishment method.
Dengguo FengYu QinWei FengJianxiong Shao
关键词:可信计算TCMTPM安全芯片匿名认证
Formal analysis of TPM2.0 key management APIs被引量:5
2014年
The trusted platform module(TPM),a system component implemented on physical resources,is designed to enable computers to achieve a higher level of security than the security level that it is possible to achieve by software alone.For this reason,the TPM provides a way to store cryptographic keys and other sensitive data in its memory,which is shielded from access by any entity other than the TPM.Users who want to use those keys and data to achieve some security goals are restricted to interact with the TPM through its APIs defined in the TPM specification.Therefore,whether the TPM can provide Protected Capabilities it claimed depends to a large extent on the security of its APIs.In this paper,we devise a formal model,which is accessible to a fully mechanized analysis,for the key management APIs in the TPM2.0 specification.We identify and formalize security properties of these APIs in our model and then successfully use the automated prover Tamarin to obtain the first mechanized analysis of them.The analysis shows that the key management subset of TPM APIs preserves the secrecy of non-duplicable keys for unbounded numbers of fresh keys and handles.The analysis also reports that the key duplication mechanism,used to duplicate a key between two hierarchies,is vulnerable to impersonation attacks,which enable an adversary to recover the duplicated key of the originating hierarchy or import his own key into the destination hierarchy.Aiming at avoiding these vulnerabilities,we proposean approach,which restricts the originating and destination TPMs to authenticate each other’s identity during duplication.Then we formally demonstrate that our approach maintains the secrecy of duplicable keys when they are duplicated.
Qianying ZhangShijun ZhaoYu QinDengguo Feng
关键词:密钥管理APITPM物理资源敏感数据
共1页<1>
聚类工具0