Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2009, Vol. 35 ›› Issue (10): 147-149. doi: 10.3969/j.issn.1000-3428.2009.10.048

• Security Technology • Previous Articles     Next Articles

Improvement Scheme on AIK Generation in Trusted Computing

SHEN Wei-jun, ZHAO Yi-ming, ZHAI Yao, QIAN Yi   

  1. (Software School, Fudan University, Shanghai 200433)
  • Received:1900-01-01 Revised:1900-01-01 Online:2009-05-20 Published:2009-05-20

可信计算中AIK密钥生成改进方案

沈为君,赵一鸣,翟 耀,钱 毅   

  1. (复旦大学软件学院,上海 200433)

Abstract: Some security problems existing in AIK keys generation protocol in trusted computing, this paper presents an improved AIK keys generation protocol. The improved protocol is constructed on the basis of non-malleable zero-knowledge protocol and adaptive chosen cipher text attack resistant cryptographic scheme. As a result, the improved protocol is proved to be non-malleable. Compared with the original one, the improved protocol has high security and can solve the existing security problems.

Key words: zero-knowledge protocol, ∑ protocol, trusted computing, non-malleability, attestation

摘要: 针对可信计算中AIK密钥生成方案中存在的若干安全隐患,提出AIK密钥生成改进方案,其中包括了使用不可锻造零知识协议和抗适应性选择密文攻击的加密体制构造改进方案的方法,结果证明改进方案具有不可锻造零知识,与原方案相比具有更高的安全性,解决了存在的安全隐患。

关键词: 零知识协议, ∑协议, 可信计算, 不可锻造性, 认证

CLC Number: