ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展

• 信息安全 • 上一篇    下一篇

一种优化的直接匿名证言协议方案

谭 良1,2 孟伟明1 周明天3   

  1. 1(四川师范大学计算机科学学院 成都 610068) 2(中国科学院计算技术研究所 北京 100190) 3(电子科技大学计算机科学与工程学院 成都 610054) (tanliang2008cn@126.com)
  • 出版日期: 2014-02-15

An Improved Direct Anonymous Attestation Scheme

Tan Liang1,2, Meng Weiming1, and Zhou Mingtian3   

  1. 1(School of Computer Science, Sichuan Normal University, Chengdu 610068) 2(Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190) 3(School of Computer Science & Engineering, University of Electronic Science & Technology of China, Chengdu 610054)
  • Online: 2014-02-15

摘要: DAA(direct anonymous attestation)既解决了隐私CA(certificate authority)的瓶颈问题,又实现了对TPM(trusted platform module)芯片的认证和匿名,是当前可信计算平台身份证明最好的理论解决方案之一.但是该协议基于强RSA困难假设,实现过程中不仅涉及到多个实体,而且涉及大量的耗时运算.突出的性能问题制约了该协议的广泛应用.基于普通椭圆曲线离散对数的困难性假设,提出了一种较为优化的直接匿名证明方案TMZ-DAA.该方案仅依赖普通椭圆曲线离散对数的困难性假设,涉及到的主要运算是椭圆曲线的点加和标量乘,复杂性大大降低,不仅密钥长度和签名长度方案较短,而且在总性能方面得到较大提高,降低了Join协议、Sign协议以及Verify算法中TPM,Host,Issuer以及Verifier等各个参与实体的计算量,为基于椭圆曲线的TPM提供了可行的隐私性保护解决方案.利用理想系统/现实系统模型对该方案的安全性进行分析和证明.结果表明,该方案满足不可伪造性、可变匿名性和不可关联性.

关键词: 可信计算, 直接匿名证明, 隐私, 强RSA困难假设, 椭圆曲线离散对数困难假设

Abstract: DAA (direct anonymous attestation), which not only resolves the bottleneck of the privacy CA (certificate authority), but also realizes anonymous and attestation, is one of the best schemes among all attestation of identity schemes currently. But due to complexity and time-consuming of the original DAA scheme, the application of DAA scheme is hindered largely. A new improved direct anonymous attestation based on the discrete logarithm problem of elliptic curves is presented. The scheme still belongs to ECC(elliptic curve cryptography)-DAA, and the scheme’s process and framework are almost same as those of other schemes. But compared with other schemes, the scheme’s main operations are point addition and scalar multiplication of elliptic curves system, the whole complexity is largely decreased, and the scheme’s key and signature length are much shorter. Meanwhile, the scheme reduces the computational cost of each entity in Join protocol, Sign protocol and Verify algorithm, including TPM (trusted platform module), Host, Issuer, Verifier. It gives a practical solution to ECC-based TPM in protecting the privacy of the TPM. This paper gives a detailed security proof of the proposed scheme in ideal-system/real-system security model which shows that the scheme meets the security requirements of unforgeability, variable anonymity and unlinkability.

Key words: trusted computing, direct anonymous attestation, privacy, strong RSA assumption;discrete logarithm problem of elliptic curves