A Remote-Attestation-Based Extended Hash Algorithm for Privacy Protection


Share / Export Citation / Email / Print / Text size:

International Journal of Advanced Network, Monitoring and Controls

Xi'an Technological University

Subject: Computer Science, Software Engineering


eISSN: 2470-8038





Volume / Issue / page

Related articles

VOLUME 2 , ISSUE 3 (September 2017) > List of articles

A Remote-Attestation-Based Extended Hash Algorithm for Privacy Protection

Yongxiong Zhang / Liangming Wang * / Yucong You / Luxia Yi

Keywords : Trusted computing, Remote attestation, Privacy protection, Merkle hash tree, Extended hash algorithm

Citation Information : International Journal of Advanced Network, Monitoring and Controls. Volume 2, Issue 3, Pages 186-189, DOI: https://doi.org/10.1109/iccnea.2017.60

License : (CC BY-NC-ND 4.0)

Published Online: 11-April-2018



Compared to other remote attestation methods, the binary-based approach is the most direct and complete one, but privacy protection has become an important problem. In this paper, we presented an Extended Hash Algorithm (EHA) for privacy protection based on remote attestation method. Based on the traditional Merkle Hash Tree, EHA altered the algorithm of node connection. The new algorithm could ensure the same result in any measure order. The security key is added when the node connection calculation is performed, which ensures the security of the value calculated by the Merkle node. By the final analysis, we can see that the remote attestation using EHA has better privacy protection and execution performance compared to other methods.

Content not available PDF Share



“Trusted computing.” [Online]. Available: http://www. trustedcomputinggroup.org/


R. Sailer, X. Zhang, T. Jaeger, and L. Van Doorn, “Design and implementation of a tcg-based integrity measurement architecture.” in USENIX Security Symposium, vol. 13, 2004, pp. 223–238.


L. Chen, R. Landfermann, H. Lohr, M. Rohe, A.-R. Sadeghi, and ¨ C. Stuble, “A protocol for property-based attestation,” in ¨ Proceedings of the first ACM workshop on Scalable trusted computing. ACM, 2006, pp. 7–16.


Sadeghi A, Stüble C. Property-Based attestation for computing platforms: caring about properties, not mechanisms. In: Raskin V, ed. Proc. of the 2004 Workshop on New Security Paradigms. New York: ACM, 2004. 67−77.


T. Rauter, A. Holler, N. Kajtazovic, and C. Kreiner, “Privilege-based ¨ remote attestation: Towards integrity assurance for lightweight clients,” in Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security. ACM, 2015, pp. 3–9.


Luo, W., Liu, W., Luo, Y., Ruan, A., Shen, Q., & Wu, Z. (2016). Partial Attestation : Towards Cost-Effective and Privacy-Preserving Remote Attestations.2016 IEEE Trustcom/BigDataSE/ISPA.IEEE,2016,pp.152 – 159


Abir Awad; Sara Kadry; Brian Lee; Gururaj Maddodi; Eoin O'Meara.Integrity Assurance in the Cloud by Combined PBA and Provenance.2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST).2016,pp,127-132


Merkle RC. Protocols for public key cryptosystems. In: Proc. of the IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 1980. 122−134.


Merkle RC. A certified digital signature. In: Brassard G, ed. Proc. of the 9th Annual Int’l Cryptology Conf. on Advances in Cryptology. Heidelberg: Springer-Verlag, 1989. 218−238.


Blum M, Evans W, Gemmell P, Kannan S, Naor M. Checking the correctness of memories. In: Proc. of the 32nd Annual Symp. on Foundations of Computer Science. Washington: IEEE Computer Society, 1991. 90−99.


Gassend B, Suh GE, Clarke D, van Dijk M, Devadas S. Caches and hash trees for efficient memory integrity verification. In: Proc. of the 9th Int’l Symp. on High-Performance Computer Architecture. Washington: IEEE Computer Society, 2003. 295−306.


Xu, Z.-Y., He, Y.-P., & Deng, L.-L. (2011). Efficient Remote Attestation Mechanism with Privacy Protection. Journal of Software, 22(2), 339–352.