Seal-based secure boot scheme for trusted computing platform

被引:0
|
作者
Song C. [1 ,2 ]
Peng W.-P. [1 ,2 ]
Xin Y. [1 ,2 ]
Luo S.-S. [1 ,2 ]
Zhu H.-L. [1 ,2 ,3 ]
机构
[1] Information Security Center, Beijing University of Posts and Telecommunications
[2] Key Laboratory of Network and Information Attack and Defence Technology, Beijing University of Posts and Telecommunications
[3] Beijing Safe-Code Technology Co. Ltd
基金
中国国家自然科学基金;
关键词
seal; secure boot; trusted computing; trusted platform module;
D O I
10.1016/S1005-8885(09)60589-6
中图分类号
学科分类号
摘要
Secure boot is one important way to ensure the security of system for the terminal computing platform. The existing solutions for platform secure boot are based on verification by matching the reference measurements with the runtime measurements. These solutions are complex and inefficient. Based on the existing secure boot scheme, a secure boot model based on trusted personal computer (PC) is designed. Through the use of the existing trusted computing technology, a seal-based secure boot scheme for trusted computing platform is proposed in this paper. In this scheme, it is not necessary to generate the certificates on components of the reference measurements; it is also not necessary for verification proxy to verify the integrity of the runtime measurements. At the same time, the security of platform system is effectively guaranteed during booting. © 2010 The Journal of China Universities of Posts and Telecommunications.
引用
收藏
页码:16 / 21
页数:5
相关论文
共 50 条
  • [31] A blockchain-based platform for decentralized trusted computing
    Liang, Yihuai
    Li, Yan
    Shin, Byeong-Seok
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (03) : 1499 - 1513
  • [32] Secure data management in trusted computing
    Kühn, U
    Kursawe, K
    Lucks, S
    Sadeghi, AR
    Stüble, C
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2005, PROCEEDINGS, 2005, 3659 : 324 - 338
  • [33] Trusted Computing Based Mobile DRM Authentication Scheme
    Yang, Zhen
    Fan, Kefeng
    Lai, Yingxu
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
  • [34] Secure user authentication based on the trusted platform for mobile devices
    Kim, GeonLyang
    Lim, JaeDeok
    Kim, JeongNyeo
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [35] Secure VPNs for Trusted Computing Environments
    Schulz, Steffen
    Sadeghi, Ahmad-Reza
    TRUSTED COMPUTING, PROCEEDINGS, 2009, 5471 : 197 - +
  • [36] Trusted computing architecture for secure SOC
    School of Computer Science, National University of Defense Technology, Changsha 410073, China
    Huazhong Ligong Daxue Xuebao, 2008, 11 (44-47):
  • [37] A methodology for secure recovery of spacecrafts based on a trusted hardware platform
    Juliato, Marcio
    Gebotys, Catherine
    ADVANCES IN SPACE RESEARCH, 2017, 59 (04) : 1077 - 1094
  • [38] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [39] One Secure Access Scheme based on Trusted Execution Environment
    Fan, Yongkai
    Liu, Shengle
    Tan, Gang
    Lin, Xiaodong
    Zhao, Guanqun
    Bai, Jianrong
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 16 - 21
  • [40] Research on the Secure Boot Scheme of Automotive MCU
    Zhang, Ping
    Yu, Zhuoping
    Zhang, Pei
    Tongji Daxue Xuebao/Journal of Tongji University, 2024, 52 : 176 - 184