Visible to the public A Remote-Attestation-Based Extended Hash Algorithm for Privacy Protection

TitleA Remote-Attestation-Based Extended Hash Algorithm for Privacy Protection
Publication TypeConference Paper
Year of Publication2017
AuthorsZhang, Y., Wang, L., You, Y., Yi, L.
Conference Name2017 International Conference on Computer Network, Electronic and Automation (ICCNEA)
ISBN Number978-1-5386-3981-8
KeywordsAlgorithm design and analysis, compositionality, Economics, Extended hash algorithm, hash algorithms, Measurement, Merkle hash tree, Niobium, privacy, privacy protection, pubcrawl, remote attestation, Resiliency, security, Software algorithms, Trusted Computing

Compared to other remote attestation methods, the binary-based approach is the most direct and complete one, but privacy protection has become an important problem. In this paper, we presented an Extended Hash Algorithm (EHA) for privacy protection based on remote attestation method. Based on the traditional Merkle Hash Tree, EHA altered the algorithm of node connection. The new algorithm could ensure the same result in any measure order. The security key is added when the node connection calculation is performed, which ensures the security of the value calculated by the Merkle node. By the final analysis, we can see that the remote attestation using EHA has better privacy protection and execution performance compared to other methods.

Citation Keyzhang_remote-attestation-based_2017