2015
DOI: 10.1002/sec.1385
|View full text |Cite
|
Sign up to set email alerts
|

Unbalanced tree‐formed verification data for trusted platforms

Abstract: Validation is an alternative approach to the establishment of the trust between two or more entities. The validation allows a challenger to evaluate the trustworthiness of an attesting system based on provided evidence. Early attempts show the evidence is always organized in a linear structure or a balanced tree. These methods, however, are not optimal when facing a complex system and privacy issues. In particular, the Stored Measurement Log (SML) to record the execution history of the attesting system brings … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…In this section, we present the evaluation on the integrity attestation of our scheme. We compare the efficiency of LPBHT with Xu et al's [26] Merkle hash tree (MHT), Zhang et al's Enhanced-MHT (E-MHT) [27], and Fu et al's stored measurement log (UBTS-SML) [29], both of which are configuration-based RA scheme and work for better efficiency. The MHT is an integrity measurement hash-tree scheme based on a balanced binary tree (BBT), which is a static measurement scheme with a very high attestation efficiency.…”
Section: Experiments and Results Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we present the evaluation on the integrity attestation of our scheme. We compare the efficiency of LPBHT with Xu et al's [26] Merkle hash tree (MHT), Zhang et al's Enhanced-MHT (E-MHT) [27], and Fu et al's stored measurement log (UBTS-SML) [29], both of which are configuration-based RA scheme and work for better efficiency. The MHT is an integrity measurement hash-tree scheme based on a balanced binary tree (BBT), which is a static measurement scheme with a very high attestation efficiency.…”
Section: Experiments and Results Analysismentioning
confidence: 99%
“…7c shows that as the number of updated nodes increases from 40 to 600 at the same time, the average updated path depth rises from 5 to 8, which is far more shortened than the depth value 14 in BBT. At last, we assume n at a [26] high static none high E-MHT [27] high dynamic low high UBTS-SML [29] high dynamic low high this paper high dynamic high high typical value, which is 8. With the strength of local principle iol increases, the efficiency of the RA is becoming better and better, which is shown in Fig.…”
Section: Experiments and Results Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…is promising technique can provide two important services, namely, secure storage and platform attestation. In recent years, we have conducted several studies [23][24][25][26] on platform attestation and its application. As another technical branch addressing the issue, a trusted environment is isolated in the CPU [27,28].…”
Section: Related Workmentioning
confidence: 99%
“…e Merkle hash tree is a fundamental technology in remote verification, which is flexible and protects privacy. Many research studies have proposed to assign different weights to the hash tree leaf nodes to achieve a better model [13,14]. However, the prior has not offered a feasible algorithm to compute and update the weight of each leaf node.…”
Section: Challengesmentioning
confidence: 99%