Seal-based secure boot scheme for trusted computing platform

被引:0
|
作者
Song C. [1 ,2 ]
Peng W.-P. [1 ,2 ]
Xin Y. [1 ,2 ]
Luo S.-S. [1 ,2 ]
Zhu H.-L. [1 ,2 ,3 ]
机构
[1] Information Security Center, Beijing University of Posts and Telecommunications
[2] Key Laboratory of Network and Information Attack and Defence Technology, Beijing University of Posts and Telecommunications
[3] Beijing Safe-Code Technology Co. Ltd
基金
中国国家自然科学基金;
关键词
seal; secure boot; trusted computing; trusted platform module;
D O I
10.1016/S1005-8885(09)60589-6
中图分类号
学科分类号
摘要
Secure boot is one important way to ensure the security of system for the terminal computing platform. The existing solutions for platform secure boot are based on verification by matching the reference measurements with the runtime measurements. These solutions are complex and inefficient. Based on the existing secure boot scheme, a secure boot model based on trusted personal computer (PC) is designed. Through the use of the existing trusted computing technology, a seal-based secure boot scheme for trusted computing platform is proposed in this paper. In this scheme, it is not necessary to generate the certificates on components of the reference measurements; it is also not necessary for verification proxy to verify the integrity of the runtime measurements. At the same time, the security of platform system is effectively guaranteed during booting. © 2010 The Journal of China Universities of Posts and Telecommunications.
引用
收藏
页码:16 / 21
页数:5
相关论文
共 50 条
  • [11] Research on trusted storage based on trusted computing platform
    School of Computer, Wuhan University, Wuhan 430072, China
    不详
    Tongxin Xuebao, 2007, SUPPL. (117-120):
  • [12] Secure Blockchain Platform for Industrial IoT with Trusted Computing Hardware
    Yang Q.
    Wang H.
    Wu X.
    Wang T.
    Zhang S.
    Liu N.
    IEEE Internet of Things Magazine, 2021, 4 (04): : 86 - 92
  • [13] Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes
    Ling, Zhen
    Yan, Huaiyu
    Shao, Xinhui
    Luo, Junzhou
    Xu, Yiling
    Pearson, Bryan
    Fu, Xinwen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 119 (119)
  • [14] Design and implementation of trusted boot based on a new trusted computing dual-architecture
    Zheng, Chenming
    Li, Jun
    Yao, Xuanxia
    COMPUTERS & SECURITY, 2023, 127
  • [15] A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
    Wang Xingfu
    Lu Qiwei
    Xiong Yan
    Miao Fuyou
    Huang Wenchao
    Liu Tao
    Wu Xuangou
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) : 284 - 290
  • [16] Secure VANETs: Trusted Communication Scheme between Vehicles and Infrastructure Based on Fog Computing
    Arif, Muhammad
    Wang, Guojun
    Balas, Valentina Emilia
    STUDIES IN INFORMATICS AND CONTROL, 2018, 27 (02): : 235 - 246
  • [17] A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
    WANG Xingfu
    LU Qiwei
    XIONG Yan
    MIAO Fuyou
    HUANG Wenchao
    LIU Tao
    WU Xuangou
    ChineseJournalofElectronics, 2014, 23 (02) : 284 - 290
  • [18] A Secure Trust Model Based on Trusted Computing
    Yin Zhixi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
  • [19] Secure and Trusted Interoperability Scheme of Heterogeneous Blockchains Platform in IoT Networks
    Liu, Xiao
    Li, Mingyuan
    Peng, Haipeng
    Luo, Shoushan
    CHINA COMMUNICATIONS, 2023, 20 (11) : 225 - 241
  • [20] A Public-Verifiable Secure Logging Scheme on Chinese Trusted Platform
    Peng Shuanghe
    Fan Meng
    Qin Yingjie
    Chen Zhige
    2013 INTERNATIONAL CONFERENCE ON CYBER SCIENCE AND ENGINEERING (CYBERSE 2013), 2013, : 324 - 330