Dissertation > Excellent graduate degree dissertation topics show

Remote Attestation Protocol Based on Proxy Multi-Signature

Author: WangJunXia
Tutor: PengXinGuang
School: Taiyuan University of Technology
Course: Computer System Architecture
Keywords: Trusted Computing Remote Attestation ECDSA proxy multi-signature
CLC: TN918.1
Type: Master's thesis
Year: 2012
Downloads: 29
Quote: 0
Read: Download Dissertation

Abstract


With the rapid development of computer systems, software attacks become more and more automated and complex. Inherent defects of the software and the passive nature of traditional way of safety prevention have been insufficient to cope with the increasing threats to security of computer systems. And security prevention mechanism which rely solely on software can not protect the security of computer and network information appropriately.Trusted Computing settles these security threats with a new design idea, which provides more security for the system platform with hardware protection and build a trusted computing environment using a combination of hardware and software on this platform. Trusted Computing can ensure that computing of its platform with features such as controllability, confidentiality and authenticity. The same time, using these features can make up the flaws and shortcomings of security prevention mechanism which relys solely on software. Thus Trusted Computing is a better way to solve security threats and challenges of computer system security.Trusted Computing is one of the hot research of computer and network information security field and ensures the security of the system platform by a TPM hardware-small tamper-resistant chip embedded on the motherboard. A core function of the Trusted Computing is remote attestation which includes a credible and complete measurement and integrity reporting. Remote attestation can send the current system state of Attestor to the remote Verifier.At present, Trusted Computing Group officially have released Remote Attestation Protocol including TPMv1.1Privacy CA and TPMv1.2Direct the Anonymous Attestation(DAA). These Remote Attestation Protocol are low efficiency and the overhead of time is too large to adapt to large-scale or reality computer system. Owing to the TPM hardware model is a single process, the remote client can only respond the request of the remote attestation in turn. When a large number of requests of remote attestation reach at the same time, issues of response efficiency arose which will become the bottleneck of the system.Remote Attestation Protocol Based on Proxy Multi-Signature is to solve the above problem. Through the use of proxy signature, remote clients can focus on the batch signature of computer cluster, which can improve the efficiency of the remote attestation. The proxy signature of this paper is based on the Elliptic Curve Digital Signature Algorithm(ECDSA). Compared to the previous proxy signature algorithm, its security is established on the intractability of Elliptic Curve Discrete Logarithm Problem. And Remote Attestation Protocol of this paper reflects the several advantages of Elliptic Curve Cryptography:high efficiency of the system, safer and short ECC key.This experiment is with Intel_i5dual-core processor,2GB of memory of a computer and Linux operating system. TPM is implemented by the TPM Emulator. We can use Java language to achieve the prototype model and control the TPM by JTSS software stack. On the credibility of the experimental environment, we can implement a prototype of remote attestatition protocol based proxy multi-signature and verify the feasibility of the remote proof.

Related Dissertations

  1. Research in Trusted Computing Based on Bometric Intelligent Terminal System,TP309
  2. Research on Management Scheme of Trusted Application Software,TP309
  3. Research on the Trusted Access of Terminals and Remote Attestation Technology,TP393.08
  4. The special trusted computing research and design of the network,TP393.08
  5. UEFI-based trust chain design and implement TPM driver,TP311.1
  6. File Protection System Research Based on Hardware Assisted Virtualization,TP309
  7. Trusted Platform on Research and Implementation of copyright protection model,TP309
  8. Design and Implementation of a Bytecode-based Software Monitoring and Trusted Evolution Framework,TP311.52
  9. Authentication Based on Trusted Computing Research and Implementation,TP393.08
  10. Udisk trust chain dynamic tracking technology research and implementation,TP309
  11. Research and Implementation of PrivacyCA System in Trusted Computing,TP393.08
  12. Based on Trusted Computing intranet information security research,TP393.08
  13. Design and Analysis of Some Security Protocols Based on CPK in Trusted Computing Environment,TP309
  14. TCG Software Stack (TSS) Specification Analysis and Implementation,TP309
  15. A continued fraction linear lower bound of research and types of proxy signature scheme design,TN918.1
  16. Parallel Efficiency Analysis on the Related Algorithms of Elliptic Curve with GPU,TN918.1
  17. Research and Application of digital signature technology in e-government,TP399-C2
  18. Research on Cryptosystems Based on Conic Curve Over Z_n,TN918.1
  19. Remote Attestation for Trusted Cloud Platform,TP393.08
  20. Research on Security Mechanism of the P2P Network Based on TPM,TP393.08
  21. The Research of Anti-Trojan Technology Based JAVA Bytecode,TP393.08

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile