%0 Journal Article
%T Research on revocation of keys in trusted environment
可信环境下的密钥撤销机制研究*
%A LI Chao-ling
%A GENG Yu-ying
%A ZHOU Yan-zhou
%A LI Fu-lin
%A LI Li-xin
%A
李超零
%A 耿玉营
%A 周雁舟
%A 李福林
%A 李立新
%J 计算机应用研究
%D 2010
%I
%X TPM is not able to destroy collapsed keys, because keys (except for SRK and EK) are stored outside of it. To solve this problem, this paper proposed two mechanisms of revoking TPM keys. Without major changes to the TPM command set, checked the validities of loaded keys by using key lists. While realizing revocation checking effectively, preserved backwards compatibility with the current TCG specifications, and introducted no overhead for normal operation. At last, to improve the efficiency of revoking and loading operations and enhance the practicability of revocation mechanism, proposed the combination of both mechanisms.
%K trusted computing
%K TPM
%K key revocation
%K key list
可信计算
%K 可信平台模块
%K 密钥撤销
%K 密钥列表
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=A9D9BE08CDC44144BE8B5685705D3AED&aid=924B94EA781EC778C1B0858E8E94D8EF&yid=140ECF96957D60B2&vid=DB817633AA4F79B9&iid=0B39A22176CE99FB&sid=C4B91B15F1F73E7E&eid=E5ED9059DE792E50&journal_id=1001-3695&journal_name=计算机应用研究&referenced_num=0&reference_num=6