首页 | 本学科首页   官方微博 | 高级检索  
     

可信计算平台模块密码机制研究
引用本文:罗捷,严飞,余发江,张焕国.可信计算平台模块密码机制研究[J].计算机应用,2008,28(8):1907-0911.
作者姓名:罗捷  严飞  余发江  张焕国
作者单位:1. 武汉大学,计算机学院,武汉,430072
2. 武汉大学,计算机学院,武汉,430072;武汉大学,软件工程国家重点实验室,武汉,430072
基金项目:国家自然科学基金资助项目 , 国家863计划项目
摘    要:可信计算已经成为世界信息安全领域的新潮流。介绍了可信计算平台模块(TPM)的基本体系,分析了它的密码机制,指出了其密码机制上的特色与不足。针对现有可信计算组织(TCG)规范中密钥管理授权机制比较复杂的缺点,结合OIAP与OSAP的思想,给出了一种授权复用的技术方案与授权协议,并给出了协议的安全性证明。

关 键 词:密码  密钥管理  可信计算平台模块(TPM)  可信计算
收稿时间:2008-04-25

Research on cryptology mechanism of trusted computing platform module
LUO Jie,YAN Fei,YU Fa-jiang,ZHANG Huan-guo.Research on cryptology mechanism of trusted computing platform module[J].journal of Computer Applications,2008,28(8):1907-0911.
Authors:LUO Jie  YAN Fei  YU Fa-jiang  ZHANG Huan-guo
Affiliation:LUO Jie1,YAN Fei1,YU Fa-jiang1,ZHANG Huan-guo1,2(1.College of Computer Science,Wuhan University,Wuhan Hubei 430072,China,2.State Key Laboratory of Software Engineering,China)
Abstract:Trusted computing is a new tendency in the field of data security. The basic architecture of trusted computing platform module was introduced, and its cryptology mechanism was discussed. Through analyzing the cryptology mechanism of TCG, the advantages and disadvantages was pointed out. Aiming at the problem that the key management and authentication of TCG specifications were very complicated, a scheme of multiusing authentication data and a authentication protocol were proposed, which colligated OIAP and OSAP, and the security proof of this protocol was given.
Keywords:cryptology  key management  trusted computing module  trusted computing
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号