[1]陈立全,何营营,王玲玲.M2M网络上的改进直接匿名认证方案[J].东南大学学报(自然科学版),2012,42(4):604-608.[doi:10.3969/j.issn.1001-0505.2012.04.005]
 Chen Liquan,He Yingying,Wang Lingling.Improved direct anonymous attestation scheme in M2M network system[J].Journal of Southeast University (Natural Science Edition),2012,42(4):604-608.[doi:10.3969/j.issn.1001-0505.2012.04.005]
点击复制

M2M网络上的改进直接匿名认证方案()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
42
期数:
2012年第4期
页码:
604-608
栏目:
计算机科学与工程
出版日期:
2012-07-20

文章信息/Info

Title:
Improved direct anonymous attestation scheme in M2M network system
作者:
陈立全 何营营 王玲玲
东南大学信息安全研究中心, 南京 210096
Author(s):
Chen Liquan He Yingying Wang Lingling
Research Center of Information Security, Southeast University, Nanjing 210096, China
关键词:
M2M 可信计算平台 直接匿名认证 双线性对
Keywords:
M2M(machine to machine) TPM(trusted platform module) DAA(direct anonymous attestation) bilinear pairing
分类号:
TP309.1
DOI:
10.3969/j.issn.1001-0505.2012.04.005
摘要:
针对现有可信计算平台中的直接匿名认证(DAA)方案存在计算过于复杂的问题,在已有的DAA协议基础上,结合M2M网络特点,提出了一种适用于M2M网络的I-DAA方案.该方案建立在椭圆曲线上的离散对数困难性问题的基础上,利用零知识证明和双线性映射理论,在证书申请阶段将部分DAA证书中原来由TPM计算的参数改为用系统公开参数替代,极大降低了资源相对较宝贵的TPM模块的计算量.同时,该方案中TPM的秘密信息改由TPM自己选取,从而减少不必要的计算开销.另外,TPM只需要申请一次DAA证书,以后即可直接向验证方提交验证信息,避免了一些现有协议的通信瓶颈.分析结果表明,I-DAA方案在保证安全的前提下降低了总体系统中尤其是TPM侧的计算复杂度,更适合于M2M系统及其他嵌入式系统应用环境.
Abstract:
Current anonymous attestation protocols(DAA)used in trusted computing platform always accompany with complicated computing. To solve this problem, the I-DAA protocol is proposed based on the mechanisms of existing DAA protocols and the characteristics of M2M network. Based on the theory of elliptic curve and the difficult problem of discrete logarithm, I-DAA also uses the zero knowledge proof and bilinear pairing theories. At the certification application stage, the public system parameters instead of those computed by TPM are used as certificated parameters to reduce the computational complexity of TPM whose computing ability is relatively more valuable. TPM selects the secret information by itself, which also reduces the computation cost of TPM. Moreover, it only needs to apply one time of DAA certification for TPM to use forever in the latter verification processing. This avoids the bottleneck of traditional DAA protocols. The analysis results show that the I-DAA scheme not only remains the security level of the traditional DAA protocols but also has great reduction of computational complexity, which makes it more suitable for M2M systems and other embedded application systems.

参考文献/References:

[1] Wu G,Talwar S,Johnsson K,et al.M2M:from mobile to embedded internet [J].IEEE Communications Magazine,2011,49(4):36-43.
[2] Sun Wenchao,Song Meina.A general M2M device model[C] //IEEE 2nd Symposium on Web Society.Beijing,China,2010:578-581.
[3] Potter B.High time for trusted computing[J].IEEE Security & Privacy,2009,7(6):54-56.
[4] Kim Mooseop,Ju Hongil,Kim Youngsae,et al.Design and implementation of mobile trusted module for trusted mobile computing [J] //IEEE Transactions on Consumer Electronics, 2010,56(1):134-140.
[5] Chen Liqun,Warinschi B.Security of the TCG Privacy-CA solution[C] //IEEE/IFIP 8th International Conference on Embedded Ubiquitous Computing.Hong Kong,China,2010:609-616.
[6] Li Lixin,Li Chaoling,Zhou Yanzhou.A remote anonymous attestation scheme with improved privacy CA[C] //International Conference on Multimedia Information Networking and Security.Wuhan,China,2009:153-157.
[7] Brickell E,Camenisch J,Chen L Q.Direct anonymous attestation[C] //Proceedings of the 11th ACM Conference on Computer and Communications Security.New York,USA,2004:132-145.
[8] Brickell E,Chen Liqun,Li Jiangtao.A new direct anonymous attestation scheme from bilinear maps[C] //Proceedings of First International Conference on Trusted Computing and Trust in Information Technologies.Villach,Austria,2008:166-178.
[9] Chen Liqun,Morrissey P,Smart N P.Pairing in trusted computing[C] //Second International Conference on Pairing-Based Cryptography-Pairing.Egham,UK,2008:1-17.
[10] Chen Liqun.A DAA scheme using batch proof and verification[C] //Proceedings of Third International Conference on Trust and Trustworthy Computing.Berlin,Germany,2010:166-180.
[11] Chen Liqun,Page D,Smart N P.On the design and implementation of an efficient DAA scheme [C] //International Conference on Smart Card Research and Advanced Application.Passau,Germany,2010:223-237.
[12] 甄鸿鹄,陈越,谭鹏,等.基于非对称双线性对的直接匿名认证方案[J].通信学报,2010,21(7):56-62.
  Zhen Honghu,Chen Yue,Tan Peng,et al.Asymmetric bilinear pairing based direct anonymous attestation scheme[J].Journal of Communications,2010,21(7):56-62.(in Chinese)

备注/Memo

备注/Memo:
作者简介: 陈立全(1976—),男,博士,副教授,Lqchen@seu.edu.cn.
基金项目: 国家自然科学基金资助项目(60902008)、信息网络安全公安部重点实验室开放课题资助项目(2010011).
引文格式: 陈立全,何营营,王玲玲.M2M网络上的改进直接匿名认证方案[J].东南大学学报:自然科学版,2012,42(4):604-608. [doi:10.3969/j.issn.1001-0505.2012.04.005]
更新日期/Last Update: 2012-07-20