发明名称 |
APPARATUS AND METHOD FOR IMPLEMENTING ZERO-KNOWLEDGE PROOF SECURITY TECHNIQUES ON A COMPUTING PLATFORM |
摘要 |
An apparatus and method for zero knowledge proof security techniques within a computing platform. One embodiment includes a security module executed on a processing core to establish a domain of trust among a plurality of layers by sending a challenge from a verification layer to a first prover layer, the challenge comprising an indication of at least one selected option; in response to receiving the challenge, generating first verification information at the first prover layer based on the secret and the indication of the selected option; sending the first verification information to at least a second prover layer, the second prover layer generating second verification information based on the first verification information and the indication of the selected option; and performing a verification operation at the verification layer using the second verification information based on the selected option. |
申请公布号 |
US2015095655(A1) |
申请公布日期 |
2015.04.02 |
申请号 |
US201314039581 |
申请日期 |
2013.09.27 |
申请人 |
Sherman Brent M. |
发明人 |
Sherman Brent M. |
分类号 |
G06F21/44 |
主分类号 |
G06F21/44 |
代理机构 |
|
代理人 |
|
主权项 |
1. An apparatus comprising:
at least one processing core to execute instructions and process data; and a security module to be executed on the processing core to establish a domain of trust among a plurality of layers, wherein establishing the domain of trust comprises: generating a secret at a first prover layer; providing information derived from the secret, but not the secret, from the first prover layer to a verification layer of the plurality of layers; sending a challenge from the verification layer to the first prover layer, the challenge comprising an indication of at least one selected option; in response to receiving the challenge, generating first verification information at the first prover layer based on the secret and the indication of the selected option; sending the first verification information to at least a second prover layer, the second prover layer generating second verification information based on the first verification information and the indication of the selected option; and performing a verification operation at the verification layer using the second verification information based on the selected option. |
地址 |
portland OR US |