Journal of Information Security Research ›› 2016, Vol. 2 ›› Issue (7): 608-621.

Previous Articles     Next Articles

Study on the CFL Trust Authentication

  

  • Received:2016-07-14 Online:2016-07-15 Published:2016-07-14

CFL可信认证研究

焦毅航   

  1. 中北大学数学系
  • 通讯作者: 焦毅航

Abstract: This paper shows a schematic diagram about the relationship between trusted computing and information security through analyzing the trusted computing,authentication techniques and authentication systems. Moreover, it not only makes a detailed analysis and comparison about various smart card authentication technology and also gives further definition of trust authentication that is if all the computation in the authentication systems is trusted, the authentication system is trusted. At last, it proves that if the CFL users are based on the independent hardware and CFL certificate generation center is also based on the independent hardware calculation, then the CFL authentication system can be trusted.

Key words: trust computing, authentication technique, authentication system, CFL (Chen, Fan, and Lü), trust root, trust authentication

摘要: 通过对可信计算、认证技术、认证体制的梳理,给出了可信计算与信息安全的关系示意图,对各种智能卡认证技术作了详细的分析与比较,进一步给出了可信认证的定义,即若认证体制在具体应用中所有计算都是可信计算,则该认证体制是可信认证.证明了若CFL用户基于独立硬件的计算,CFL证书生成中心也基于独立的硬件计算,则CFL认证体制可实现可信认证.

关键词: 可信计算, 认证技术, 认证体制, CFL (Chen, Fan, and Lü), 可信根, 可信认证