DocumentCode :
3218543
Title :
An efficient PBA protocol based on elliptic curves
Author :
Chu, XiaoBo ; Qin, Yu ; Feng, Dengguo
Author_Institution :
State Key Lab. of Inf. Security, Chinese Acad. of Sci., Beijing, China
fYear :
2011
fDate :
27-29 May 2011
Firstpage :
415
Lastpage :
420
Abstract :
Remote attestation is one of the main topics in trusted computing research area. It has great significance in attesting trustworthiness of terminal platform and establishing remote trust relationship in distributed computing environment. Property-based attestation(PBA for short) is an emerging method in which binary integrity value has been replaced with secure property as the content to attest. PBA has drawn great attention for several aspects of advantages including better scalability, better usability and better protection on configuration privacy. Unfortunately, current PBA protocols have suffered a lot from low performance and high implementation cost. In these protocols, secure chip with only limited computation capacity is arranged to execute too much computations. This reasonless design not only makes the secure chip be a bottleneck of performance but also increases secure chip´s production cost. In this paper, we propose an efficient PBA protocol based on elliptic curve cryptography. Compared with existing schemes, our protocol greatly enhances performance with very limited cost. The basic idea to achieve this improvement is (1)transforming computations on large finite field executed by secure chip into computations in small group of elliptic curve points and (2)adopting batch proof skills and asymmetric pairings. Under random oracle model, our protocol is proved to be secure.
Keywords :
authorisation; cryptographic protocols; data privacy; public key cryptography; PBA protocol; asymmetric pairing; batch proof skills; binary integrity; configuration privacy protection; distributed computing; elliptic curve cryptography; property-based attestation; random oracle model; remote attestation; remote trust relationship; secure chip; terminal platform trustworthiness; trusted computing; Computational efficiency; Computer architecture; Elliptic curves; Galois fields; Production; Protocols; Security; property-based attestation; remote attesatation; trusted computing; trusted platform module;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on
Conference_Location :
Xi´an
Print_ISBN :
978-1-61284-485-5
Type :
conf
DOI :
10.1109/ICCSN.2011.6013624
Filename :
6013624
Link To Document :
بازگشت