Unlock instant, AI-driven research and patent intelligence for your innovation.

Trusted computing platform attribute verification method based on ring signature

A computing platform and trusted computing technology, applied in the field of information security, can solve problems such as the platform being vulnerable to attacks, affecting the verification efficiency of the trusted computing platform, and the low efficiency of zero-knowledge proof implementation.

Active Publication Date: 2015-09-16
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this proof method exposes the specific configuration information of the local platform, making the platform more vulnerable to attacks
In addition, this proof method requires zero-knowledge proof, and the implementation efficiency of zero-knowledge proof is low, so it will affect the verification efficiency of trusted computing platforms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted computing platform attribute verification method based on ring signature
  • Trusted computing platform attribute verification method based on ring signature
  • Trusted computing platform attribute verification method based on ring signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Embodiments of the present invention: a method for verifying attributes of a trusted computing platform based on ring signatures, including the following stages:

[0038] 1. Parameter initialization stage

[0039] Computing platforms A and B are designed to be the two parties for automatic verification of platform attributes. Computing platforms A and B are respectively embedded with trusted chips A and B, and attributes P in the attribute certificate (whether it supports application isolation, whether it has virus protection capabilities, whether The latest and so on can be used as an attribute) Corresponding to multiple platform configurations C 1 ,C 2 ,...,C N , each trusted chip has an ECC key pair (PIKS, PIKP), where PIKS is the private key and PIKP is the corresponding public key;

[0040] When computing platform A needs to prove to computing platform B that it is the legitimate owner of trusted chip A, computing platform A selects other t-1 computing platforms...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted computing platform attribute verification method based on a ring signature. The method comprises the following steps: a computing platform A and a computing platform B are set as two parts performing platform attribute automation verification, an attribute P in an attribution certificate corresponds to platform configurations C<1>, C<2>... C<N>, and the computing platform A selects a computing platform of other t-1 embedded trusted chips to, together with the computing platform A, form a ring; a configuration information abstract value C<r> (1<=r<=N) stored in a corresponding PCR is extracted by an embedded trusted chip A of the computing platform A, private information is randomly selected by the trusted chip A to be multiplied by A, and an attribute hidden value y=x<-1>(H<1>(P, C<1>,C<2>...C<N>)+dr)mod n and a signature final value are computed; and an interaction verification stage, that private information x selected by a resource provider, i.e., the computing platform B and a private key d simultaneously participate in operation and whether the computing platform A has the attribute P is verified, is performed. Remote anonymity of computing platform verification can be met, a privacy is protected, and verification efficiency of the trusted computing platform is also improved.

Description

technical field [0001] The invention relates to a method for verifying attributes of a trusted computing platform based on a ring signature, and belongs to the technical field of information security. Background technique [0002] Since the internal network of the power grid system has high requirements on the computing platform, after installing various applications and security protection software, the installed software needs to be reinforced twice before the installed software can be allowed to access the internal network. Therefore, internal Attribute certificates, which are jointly issued by trusted chips and their hosts, are used to illustrate that the current platform has certain attributes, rather than directly considering external attribute certificates (certificates issued directly by the manufacturer that produces the software). [0003] For internal attribute certificates, since the configuration information of the real reporting platform is required, it must be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/06
Inventor 邹洪魏理豪彭泽武李伟清林泽鑫唐亮亮冯歆尧陈锐忠赵延帅李皓
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT