Seal-based secure boot scheme for trusted computing platform

被引:0
|
作者
Song C. [1 ,2 ]
Peng W.-P. [1 ,2 ]
Xin Y. [1 ,2 ]
Luo S.-S. [1 ,2 ]
Zhu H.-L. [1 ,2 ,3 ]
机构
[1] Information Security Center, Beijing University of Posts and Telecommunications
[2] Key Laboratory of Network and Information Attack and Defence Technology, Beijing University of Posts and Telecommunications
[3] Beijing Safe-Code Technology Co. Ltd
基金
中国国家自然科学基金;
关键词
seal; secure boot; trusted computing; trusted platform module;
D O I
10.1016/S1005-8885(09)60589-6
中图分类号
学科分类号
摘要
Secure boot is one important way to ensure the security of system for the terminal computing platform. The existing solutions for platform secure boot are based on verification by matching the reference measurements with the runtime measurements. These solutions are complex and inefficient. Based on the existing secure boot scheme, a secure boot model based on trusted personal computer (PC) is designed. Through the use of the existing trusted computing technology, a seal-based secure boot scheme for trusted computing platform is proposed in this paper. In this scheme, it is not necessary to generate the certificates on components of the reference measurements; it is also not necessary for verification proxy to verify the integrity of the runtime measurements. At the same time, the security of platform system is effectively guaranteed during booting. © 2010 The Journal of China Universities of Posts and Telecommunications.
引用
收藏
页码:16 / 21
页数:5
相关论文
共 50 条
  • [21] Secure and Trusted Interoperability Scheme of Heterogeneous Blockchains Platform in IoT Networks
    Xiao Liu
    Mingyuan Li
    Haipeng Peng
    Shoushan Luo
    ChinaCommunications, 2023, 20 (11) : 225 - 241
  • [22] RT Framework Based on Trusted Computing Platform
    Geng, Xiuhua
    Han, Zhen
    Cai, Ying
    ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 2770 - 2773
  • [23] A SECURE AND TRUSTED BOOT PROCESS FOR AVIONICS WIRELESS NETWORKS
    Markantonakis, Konstantinos
    Akram, Raja Naeem
    2016 INTEGRATED COMMUNICATIONS NAVIGATION AND SURVEILLANCE (ICNS), 2016,
  • [24] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [25] A Secure and Reliable Platform Configuration Change Reporting Mechanism for Trusted Computing Enhanced Secure Channels
    Dietrich, Kurt
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2137 - 2142
  • [26] Password management scheme based on trusted computing
    National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
    Beijing Youdian Daxue Xuebao, 2008, 5 (93-97):
  • [27] A Signature Scheme Based Trusted Computing Plat
    Jiao, Hongqiang
    Zhang, Yanjun
    Li, Hui
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 356 - 359
  • [29] Research on Storage Security Based on Trusted Computing Platform
    He, Jian
    Xu, Mingdi
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 448 - +
  • [30] Research and Realization of Trusted Computing Platform Based on EFI
    Fang, Weiwei
    Yang, Bingru
    Peng, Zheng
    Tang, ZhiGang
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 43 - 46