论文部分内容阅读
This paper analyzes trusted network connect (TNC) protocols within the universally composable (UC) framework. We propose the first TNC model in the UC framework by first designing the TNC ideal functionality FTNC, the EAP ideal functionality FEAP and the EAP-TNC ideal functionality FE-PA. Then, we construct a trusted network connect protocol named TK-TNC that UC-realizes FTNC in the (FEAP, FE-PA)- hybrid model. Subsequently, we perform a security analysis on protocol D-H PN given in the TCG specification and show that this protocol cannot securely realize the EAP-TNC ideal functionality and be resistant to an attack. Finally, we propose an alternative protocol using the twin Diffie-Hellman key-exchange technique, named protocol TD-H PN, which can securely realize the EAP-TNC ideal functionality in the (FREG, FCERT)-hybrid model.
This paper analyzes trusted network connect (TNC) protocols within the universally composable (UC) framework. We propose the first TNC model in the UC framework by first designing the TNC ideal functionality FTNC, the EAP ideal functionality FEAP and the EAP-TNC ideal functionality FE-PA. Then, we construct a trusted network connect protocol named TK-TNC that UC-realizes FTNC in the FEAP, FE-PA - hybrid model. specification and show that this protocol can not help the the EAP-TNC ideal functionality and be resistant to an attack. Finally, we propose an alternative protocol using the twin Diffie-Hellman key-exchange technique, named protocol TD-H PN, which can securely realize the EAP-TNC ideal functionality in the (FREG, FCERT) -hybrid model.