首页 | 本学科首页   官方微博 | 高级检索  
     


Efficient ID-based TPM key loading scheme for trusted platform
Authors:SONG Cheng  LIU Bing  HU Zheng-ming  XIN Yang  YANG Yi-xian  YIN Han
Affiliation:[1]Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China [2]Key Laboratory of Network and Information Attack and Defense Technology of Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China [3]National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China [4]Beijing Safe-Code Technology Co., Ltd, Beijing 100876, China [5]Huawei Technology Ltd, Beijing 100093, China
Abstract:One important function in trusted computing is protected storage,which can protect unlimited amount of data and keys.In the existing trusted platform module(TPM)key loading scheme for trusted platform,a computing platform with TPM as its trusted anchor,the total times of loading operation is the same as the number of the loaded target object's ancestors,resulting in low efficiency of loading a TPM key which has many ancestors.To improve efficiency,an identity-based TPM key loading scheme is proposed.In this scheme,the times of loading operation is only two when any TPM key is loaded into TPM.Therefore,the required time cost for loading a TPM key can be reduced,especially for complex TPM key storage hierarchy.By analyzing the correctness,security,efficiency and feasibility,the proposed scheme has the better theoretical and application value.
Keywords:trusted computing  trusted platform module  protected storage  ID-based
本文献已被 维普 万方数据 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号