会议专题

An Improved Design of Clone TPM Detecting

Anting at the difficulties of detecting clone TPM in DAA protocol using variable basename,a new method to detect clone TPM was proposed.which offers TPM high degree of anonymity.DAA certificate issuer has a new public-key PK_N besides primary public-key PK-Every TPM has two certificate:DAA certificate and DAA_N certificate, DAA certificate issuer detects clone TPM by DAA., certificate and validates TPM identity by DAA certificate.Analysis and simulation are conducted for our detecting method and exiting proposals.The results show that our detecting method has high detection rate and low leak alarm rate.lt is easy that the method can be deployed in those systems that have online TTP.

trusted computing direct anonymous attestation trusted platform module

Niu Cheng-zhen

Department of Computer Science Shanxi Engineering Vocational College Taiyuan, China

国际会议

The 2010 International Conference on Computer Application and System Modeling(2010计算机应用与系统建模国际会议 ICCASM 2010)

太原

英文

113-116

2010-10-22(万方平台首次上网日期,不代表论文的发表时间)