摘要: |
作为拟态防御技术的基本实现模型, 动态异构冗余(Dynamic Heterogeneous Redundancy, DHR)系统在分布式场景下存在通信安全问题: 由于系统内缺乏对异构执行体的匿名保护措施以及诚实性度量方法, 异构执行体可能在未经察觉的情况下被攻击者入侵, 进而使得系统整体失效。将可信计算模块(Trusted Platform Module, TPM)引入分布式DHR系统可以缓解上述问题。然而, 现有TPM标准中使用的直接匿名认证(Direct Anonymous Attestation, DAA)方案会破坏分布式DHR系统的动态反馈机制, 因此无法直接应用于分布式DHR系统。为此,本文对DAA方案进行改进, 提出了一种适用于分布式DHR系统的可追溯直接匿名认证方案(Traceable Direct Anonymous Authentication Scheme, Tra-DAA)。本方案在维持系统内异构执行体对外匿名的同时, 为各异构执行体增加了内部追溯参数, 兼容了DHR系统的动态反馈性。此外, 我们引入了委托计算技术, 将TPM中的计算量降到了理论最低值。安全分析证明Tra-DAA在DL、DH、DBDH和LRSW假设下具备安全性, 即实现了匿名、证书不可伪造以及签名不可陷害。理论分析表明Tra-DAA相比多种代表性DAA方案在TPM运算量上具备显著优势。实验结果表明, Tra-DAA中新增的可追溯功能在整体耗时中仅占5%, 且Tra-DAA的整体效率相比TPM v2.0中的DAA方案有显著提升。具体来说, 在Join协议、伪名为空的Sign/Verifier协议, 以及伪名不为空的Sign/Verifier协议阶段, TPM的计算耗时分别缩短了33%、50%与70%。 |
关键词: 拟态防御 动态异构冗余 直接匿名认证 可信计算 |
DOI:10.19363/J.cnki.cn10-1380/tn.2023.11.01 |
投稿时间:2022-03-09修订日期:2022-05-25 |
基金项目:本课题得到国家重点研发计划项目(No. 2020YFE0200600)资助。 |
|
Traceable Direct Anonymous Authentication Scheme for Distributed DHR System |
CHEN Liquan,ZHANG Ziyan,YANG Ziyu,LIU Suhui |
School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China;Purple Mountain Laboratories, Nanjing 211118, China |
Abstract: |
As the basic implementation model of mimic defense technology, dynamic heterogeneous redundancy (DHR) system has a communication security problem in distributed scenarios: due to the lack of honesty measures and anonymity protection measures for heterogeneous executives, heterogeneous execution party may be invaded by an attacker without being detected, resulting in the failure of the entire system. Introducing the trusted platform module (TPM) into the distributed DHR system can alleviate the above problems. However, the direct anonymous authentication (DAA) scheme used in the existing TPM standard will invalidate the dynamic feedback of the distributed DHR system, so it cannot be directly applied. In this paper, we improve the DAA scheme and propose a traceable direct anonymous authentication scheme (Tra-DAA) for distributed DHR system. The Tra-DAA scheme maintains the external anonymity of the heterogeneous executives in the system, and configures internal traceability parameters for each heterogeneous executive so as to realize the compatibility with the dynamic feedback of the DHR system. Meanwhile, by introducing the technology of delegation of computation, the computation amount of TPM is reduced to the theoretical minimum. Security analysis proves that the Tra-DAA scheme is secure under the assumption of DL, DDH, DBDH, and LRSW, and realizes anonymity, unforgeability of certificate and unforgeability of signatures. Theoretical analysis indicates that the Tra-DAA has a significant advantage in the computation overhead of TPM compared with other representative DAA schemes. Experiments results show that the new traceability function in the Tra-DAA scheme accounts for only 5% of the overall time-consuming, and the overall efficiency of the Tra-DAA scheme is significantly improved compared with the DAA scheme in TPM v2.0. Specifically, during the execution of the Join protocol, the Sign/Verifier protocol with an empty pseudonym, and the Sign/Verifier protocol with a non-empty pseudonym, operation times of TPM are shortened by 33%, 50%, and 70%, respectively. |
Key words: mimic defense dynamic heterogeneous redundancy direct anonymous authentication trusted computing |