A secure robust integrity reporting protocol of trusted computing for remote attestation under fully adaptive party corruptions

Liehuang Zhu, Zijian Zhang*, Lejian Liao, Cong Guo

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Citations (Scopus)

Abstract

Trusted computing has been proposed to enhance the security of computing environment in disparate computer platforms. Remote attestation is necessary to prove integrity and authenticity of system environments. Stumpf et al. propose a robust integrity reporting protocol for remote attestation. However, their protocol is not secure under fully adaptive party corruptions. In this paper, we propose a secure integrity reporting protocol for remote attestation under fully adaptive party corruptions.

Original languageEnglish
Title of host publicationFuture Wireless Networks and Information Systems
Pages211-217
Number of pages7
EditionVOL. 1
DOIs
Publication statusPublished - 2012
Event2011 International Conference on Future Wireless Networks and Information Systems, ICFWI 2011 - Macao, China
Duration: 30 Nov 20111 Dec 2011

Publication series

NameLecture Notes in Electrical Engineering
NumberVOL. 1
Volume143 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference2011 International Conference on Future Wireless Networks and Information Systems, ICFWI 2011
Country/TerritoryChina
CityMacao
Period30/11/111/12/11

Keywords

  • Adaptive Party Corruptions
  • Integrity Reporting Protocol
  • Trusted Computing

Fingerprint

Dive into the research topics of 'A secure robust integrity reporting protocol of trusted computing for remote attestation under fully adaptive party corruptions'. Together they form a unique fingerprint.

Cite this