Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A novel ID-based group signature
Information Sciences—Informatics and Computer Science: An International Journal
Formal requirements for virtualizable third generation architectures
Communications of the ACM
A group signature scheme with strong separability
Journal of Systems and Software
Xen and the art of virtualization
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
ReVirt: enabling intrusion analysis through virtual-machine logging and replay
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
vTPM: virtualizing the trusted platform module
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
A user-mode port of the linux kernel
ALS'00 Proceedings of the 4th annual Linux Showcase & Conference - Volume 4
The origin of the VM/370 time-sharing system
IBM Journal of Research and Development
Hi-index | 0.00 |
Nowadays coordinated applications become more and more popular in network computing environments, and group is the basic unit of task processing for such applications. Members in a group exchange data with each other. Group signature is used to guarantee the integrity of exchanged data and provide source authentication. In a Virtual Machine (VM) based computing system, a Virtual Machine Monitor (VMM) allows multiple applications to run in different virtual machines, and each virtual machine runs in its own hardware protection domain, and is strongly isolated from each other. A Trusted VMM can provide stronger security protection to build group signature architecture than traditional computing platforms. In this paper, we first introduce a trusted group signature architecture in virtual computing environment and how the Trusted VMM (TVMM) provides security guarantee for group signature components. Then we propose a group signature scheme with the function of message checking based on the discrete logarithm problem (DLP). Finally, we prove the security of the group signature scheme and architecture.