Seal-based secure boot scheme for trusted computing platform

被引:0
|
作者
Song C. [1 ,2 ]
Peng W.-P. [1 ,2 ]
Xin Y. [1 ,2 ]
Luo S.-S. [1 ,2 ]
Zhu H.-L. [1 ,2 ,3 ]
机构
[1] Information Security Center, Beijing University of Posts and Telecommunications
[2] Key Laboratory of Network and Information Attack and Defence Technology, Beijing University of Posts and Telecommunications
[3] Beijing Safe-Code Technology Co. Ltd
基金
中国国家自然科学基金;
关键词
seal; secure boot; trusted computing; trusted platform module;
D O I
10.1016/S1005-8885(09)60589-6
中图分类号
学科分类号
摘要
Secure boot is one important way to ensure the security of system for the terminal computing platform. The existing solutions for platform secure boot are based on verification by matching the reference measurements with the runtime measurements. These solutions are complex and inefficient. Based on the existing secure boot scheme, a secure boot model based on trusted personal computer (PC) is designed. Through the use of the existing trusted computing technology, a seal-based secure boot scheme for trusted computing platform is proposed in this paper. In this scheme, it is not necessary to generate the certificates on components of the reference measurements; it is also not necessary for verification proxy to verify the integrity of the runtime measurements. At the same time, the security of platform system is effectively guaranteed during booting. © 2010 The Journal of China Universities of Posts and Telecommunications.
引用
收藏
页码:16 / 21
页数:5
相关论文
共 50 条
  • [41] A new approach to multilevel security based on trusted computing platform
    Zuo, Xiao-Dong
    Liu, Feng-Mei
    Ma, Chao-Bin
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2158 - +
  • [42] Research and application of trusted computing platform based on portable TPM
    Fang, Weiwei
    Zhou, Changsheng
    Zhang, Ying
    Zhang, Liang
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 506 - 509
  • [43] WEB SERVICE SYSTEM STRUCTURE BASED ON TRUSTED COMPUTING PLATFORM
    Xu, Feng
    Ma, Hongxu
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2013, 19 (02): : 175 - 184
  • [44] A document protection solution in mobile platform based on trusted computing
    Yu, Xiaojun
    Wen, Qiaoyan
    Yan, Tao
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 251 - 255
  • [45] Sharing model for trusted computing platform
    Zhang, Qin
    Chen, Chunrun
    Qiang, Weizhong
    Liu, Yingshu
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (12): : 5 - 8
  • [46] Research and Design of Trusted Computing Platform
    Zhou Yun-ting
    Deng Mao-lin
    Chong Yu-hai
    Ji Feng-zhu
    He Xiao-gang
    Tang Qi-jie
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 1183 - 1188
  • [47] A mobile and portable trusted computing platform
    Surya Nepal
    John Zic
    Dongxi Liu
    Julian Jang
    EURASIP Journal on Wireless Communications and Networking, 2011
  • [48] A mobile and portable trusted computing platform
    Nepal, Surya
    Zic, John
    Liu, Dongxi
    Jang, Julian
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011, : 1 - 19
  • [49] Trusted Secure Routing Schemes Based on Intelligent Computing: A Brief Review
    Jia, Guoqing
    Sun, Changhui
    Fang, Weidong
    Chen, Wei
    Song, Guannan
    Zhang, Wuxiong
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT V, ICIC 2024, 2024, 14879 : 275 - 284
  • [50] A new security scheme of trusted mobile platform based on MTM
    Yang, Manzhi
    Zhou, Huixiang
    ENERGY SCIENCE AND APPLIED TECHNOLOGY, 2016, : 415 - 418