{"title":"Trusted Channels with Password-Based Authentication and TPM-Based Attestation","authors":"Lingli Zhou, Zhenfeng Zhang","doi":"10.1109/CMC.2010.232","DOIUrl":null,"url":null,"abstract":"Trusted channels establish trust of endpoint by linking endpoint configuration information to secure channels. Many trusted channels for client-server applications are established based on Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols. Two existing solutions for building trusted channels are shown to be vulnerable to collusion attacks in this paper. Then we propose a protocol to establish trusted channels using password-based authenticated key exchange and TPM-based attestation. Our protocol uses an efficient but different binding approach to resist the proposed collusion attack. Furthermore, we propose an extended protocol to achieve enhanced privacy for clients.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Communications and Mobile Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMC.2010.232","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19
Abstract
Trusted channels establish trust of endpoint by linking endpoint configuration information to secure channels. Many trusted channels for client-server applications are established based on Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols. Two existing solutions for building trusted channels are shown to be vulnerable to collusion attacks in this paper. Then we propose a protocol to establish trusted channels using password-based authenticated key exchange and TPM-based attestation. Our protocol uses an efficient but different binding approach to resist the proposed collusion attack. Furthermore, we propose an extended protocol to achieve enhanced privacy for clients.