{"title":"具有基于密码的身份验证和基于tpm的认证的可信通道","authors":"Lingli Zhou, Zhenfeng Zhang","doi":"10.1109/CMC.2010.232","DOIUrl":null,"url":null,"abstract":"Trusted channels establish trust of endpoint by linking endpoint configuration information to secure channels. Many trusted channels for client-server applications are established based on Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols. Two existing solutions for building trusted channels are shown to be vulnerable to collusion attacks in this paper. Then we propose a protocol to establish trusted channels using password-based authenticated key exchange and TPM-based attestation. Our protocol uses an efficient but different binding approach to resist the proposed collusion attack. Furthermore, we propose an extended protocol to achieve enhanced privacy for clients.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"Trusted Channels with Password-Based Authentication and TPM-Based Attestation\",\"authors\":\"Lingli Zhou, Zhenfeng Zhang\",\"doi\":\"10.1109/CMC.2010.232\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Trusted channels establish trust of endpoint by linking endpoint configuration information to secure channels. Many trusted channels for client-server applications are established based on Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols. Two existing solutions for building trusted channels are shown to be vulnerable to collusion attacks in this paper. Then we propose a protocol to establish trusted channels using password-based authenticated key exchange and TPM-based attestation. Our protocol uses an efficient but different binding approach to resist the proposed collusion attack. Furthermore, we propose an extended protocol to achieve enhanced privacy for clients.\",\"PeriodicalId\":296445,\"journal\":{\"name\":\"2010 International Conference on Communications and Mobile Computing\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Communications and Mobile Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CMC.2010.232\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Communications and Mobile Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMC.2010.232","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trusted Channels with Password-Based Authentication and TPM-Based Attestation
Trusted channels establish trust of endpoint by linking endpoint configuration information to secure channels. Many trusted channels for client-server applications are established based on Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols. Two existing solutions for building trusted channels are shown to be vulnerable to collusion attacks in this paper. Then we propose a protocol to establish trusted channels using password-based authenticated key exchange and TPM-based attestation. Our protocol uses an efficient but different binding approach to resist the proposed collusion attack. Furthermore, we propose an extended protocol to achieve enhanced privacy for clients.