Seal-based secure boot scheme for trusted computing platform

被引:0
|
作者
Song C. [1 ,2 ]
Peng W.-P. [1 ,2 ]
Xin Y. [1 ,2 ]
Luo S.-S. [1 ,2 ]
Zhu H.-L. [1 ,2 ,3 ]
机构
[1] Information Security Center, Beijing University of Posts and Telecommunications
[2] Key Laboratory of Network and Information Attack and Defence Technology, Beijing University of Posts and Telecommunications
[3] Beijing Safe-Code Technology Co. Ltd
基金
中国国家自然科学基金;
关键词
seal; secure boot; trusted computing; trusted platform module;
D O I
10.1016/S1005-8885(09)60589-6
中图分类号
学科分类号
摘要
Secure boot is one important way to ensure the security of system for the terminal computing platform. The existing solutions for platform secure boot are based on verification by matching the reference measurements with the runtime measurements. These solutions are complex and inefficient. Based on the existing secure boot scheme, a secure boot model based on trusted personal computer (PC) is designed. Through the use of the existing trusted computing technology, a seal-based secure boot scheme for trusted computing platform is proposed in this paper. In this scheme, it is not necessary to generate the certificates on components of the reference measurements; it is also not necessary for verification proxy to verify the integrity of the runtime measurements. At the same time, the security of platform system is effectively guaranteed during booting. © 2010 The Journal of China Universities of Posts and Telecommunications.
引用
收藏
页码:16 / 21
页数:5
相关论文
共 50 条
  • [2] An Improved Scheme of μTESLA Authentication based Trusted Computing Platform
    Du, Ruiying
    Wen, Song
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4711 - 4714
  • [3] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [4] Runtime-Based Boot Components Re-measurement Scheme for Trusted Platform
    Peng Weiping
    Zhou Yajian
    Wang Cong
    Yang Yixian
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 388 - 391
  • [5] Runtime-Based Boot Components Re-measurement Scheme for Trusted Platform
    Peng Weiping
    Zhou Yajian
    Wang Cong
    Yang Yixian
    PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 303 - 310
  • [6] Efficient and Secure Multi-Signature Scheme Based on Trusted Computing
    HAO Liming1
    2.School of Information Security Engineering
    WuhanUniversityJournalofNaturalSciences, 2008, (02) : 180 - 184
  • [7] A secure bootstrap based on trusted computing
    Gu, Junkai
    Ji, Weiyong
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 502 - 504
  • [8] Research and Implement of Secure Bootstrap for Virtual Machine based on Trusted Computing Platform
    Zhu, Zhiqiang
    Xu, Mingdi
    Zhang, Huanguo
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 514 - 519
  • [9] A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment
    Liu, Zewei
    Hu, Chunqiang
    Li, Ruinian
    Xiang, Tao
    Li, Xingwang
    Yu, Jiguo
    Xia, Hui
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2325 - 2336
  • [10] Secure DRM scheme for future mobile networks based on trusted mobile platform
    Zheng, Y
    He, D
    Wang, HX
    Tang, XH
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1164 - 1167