In the remote attestation on Trusted Computer (TC) computing mode TCCP, the trusted computer TC has an excessive burden, and anonymity and platform configuration information security of computing nodes cannot be guaranteed. To overcome these defects, based on the research on and analysis of current schemes, we propose an anonymous proof protocol based on property certificate. The platform configuration information is converted by the matrix algorithm into the property certificate, and the remote attestation is implemented by trusted ring signature scheme based on Strong RSA Assumption. By the trusted ring signature scheme based on property certificate, we achieve the anonymity of computing nodes and prevent the leakage of platform configuration information. By simulation, we obtain the computational efficiency of the scheme. We also expand the protocol and obtain the anonymous attestation based on ECC. By scenario comparison, we obtain the trusted ring signature scheme based on RSA, which has advantages with the growth of the ring numbers. © 2014 Zhen-Hu Ning et al.
CITATION STYLE
Ning, Z. H., Jiang, W., Zhan, J., & Liang, P. (2014). Property-based anonymous attestation in trusted cloud computing. Journal of Electrical and Computer Engineering. https://doi.org/10.1155/2014/687158
Mendeley helps you to discover research relevant for your work.