Anonymous authentication algorithm for remote authentication between credible platforms

An anonymous authentication and remote attestation technology, applied in the field of information security, can solve problems such as complex calculation process, difficulty in realizing zero-knowledge authentication, and limited computing power

Active Publication Date: 2014-01-29
HANGZHOU SUNYARD DIGITAL SCI
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] This zero-knowledge proof authentication scheme satisfies the authentication requirements of trusted computing and the confidentiality requirements of user information. However, due to its complex calculation process, there are a large number of modular exponentiation operations, and it involves many large numbers far exceeding 1024 bits. However, the trusted platform module has limited resources and limited computing power, and generally can only support calculations up to 1024×1024
Even if some accelerated signature or decryption algorithms are used, it is still difficult to reduce all large numbers to less than 1024 bits. As far as the current technical level is concerned, in the absence of breakthroughs in the development of trusted platform module hardware chips, based on zero-knowledge authentication almost impossible to implement
[0016] To sum up, the existing authentication technologies are difficult to meet the anonymous authentication requirements between trusted platforms.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous authentication algorithm for remote authentication between credible platforms
  • Anonymous authentication algorithm for remote authentication between credible platforms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in further detail below in combination with specific embodiments.

[0036] The present invention provides an anonymous authentication algorithm for remote certification of a trusted platform. This algorithm is based on the theoretical assumption of the public key encryption system RSA Assumption. Since the theoretical assumption of the public key encryption system is a well-known technology in the field of information security, it will not be described in detail. The present invention includes The following steps:

[0037] (1) Parameter initialization: The trusted platform involved in the verification of both parties selects two different large prime numbers PR 1 、PR 2 , set parameter n A =PR 1 PR 2 , e A =(PR 1 -1)(PR 2 -1), set the public parameter g A , g A for not more than n A A positive integer of , at the same time through the key generator of the trusted platform and the parameter e A Generate a public-private k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anonymous authentication algorithm for remote authentication between credible platforms. By the anonymous authentication algorithm provided by the invention, good anonymity performance is obtained, the identity information of a transmitter is authenticated and the privacy information of the transmitter is protected, a power exponent calculation is utilized, the frequency of the calculation is a constant, so the frequency of encryption and decryption operation is reduced, the scheme efficiency cannot be influenced by the scale expansion of a signature ring, and the complexity of the algorithm can be relatively accepted by the credible platforms. Therefore, requirements on direct and anonymous authentication between credible platforms can be basically met.

Description

Technical field: [0001] The invention relates to the field of information security, in particular to an anonymous authentication algorithm for remote certification of a trusted platform. Background technique: [0002] Remote attestation is one of the fundamental features of trusted computing. Trusted computing can realize the security verification of access terminals through remote attestation. According to the specification document proposed by the Trusted Computing Group, the server realizes the proof by checking the integrity of the remote computer platform to determine the trust. However, when the server performs security detection, the access terminal must provide various configuration information of the platform, which easily violates the privacy of the terminal user. In consideration of this, Trusted Computing Organization introduces AIK (Attestation Identity Keys) to protect the signature key EK (Endorsement Key) of the Trusted Platform Module so as to hide the ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30
Inventor 李海建程宏峰
Owner HANGZHOU SUNYARD DIGITAL SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products