A ring signature-based attribute verification method for trusted computing platforms
A computing platform and trusted computing technology, applied in the field of information security, can solve problems that affect the verification efficiency of the trusted computing platform, the platform is vulnerable to attacks, and the implementation efficiency of zero-knowledge proof is low.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] Embodiments of the present invention: a method for verifying attributes of a trusted computing platform based on ring signatures, including the following stages:
[0038] 1. Parameter initialization stage
[0039] Computing platforms A and B are designed to be the two parties for automatic verification of platform attributes. Computing platforms A and B are respectively embedded with trusted chips A and B, and attributes P in the attribute certificate (whether it supports application isolation, whether it has virus protection capabilities, whether The latest and so on can be used as an attribute) Corresponding to multiple platform configurations C 1 ,C 2 ,...,C N , each trusted chip has an ECC key pair (PIKS, PIKP), where PIKS is the private key and PIKP is the corresponding public key;
[0040] When computing platform A needs to prove to computing platform B that it is the legitimate owner of trusted chip A, computing platform A selects other t-1 computing platforms...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


