全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Research on revocation of keys in trusted environment
可信环境下的密钥撤销机制研究*

Keywords: trusted computing,TPM,key revocation,key list
可信计算
,可信平台模块,密钥撤销,密钥列表

Full-Text   Cite this paper   Add to My Lib

Abstract:

TPM is not able to destroy collapsed keys, because keys (except for SRK and EK) are stored outside of it. To solve this problem, this paper proposed two mechanisms of revoking TPM keys. Without major changes to the TPM command set, checked the validities of loaded keys by using key lists. While realizing revocation checking effectively, preserved backwards compatibility with the current TCG specifications, and introducted no overhead for normal operation. At last, to improve the efficiency of revoking and loading operations and enhance the practicability of revocation mechanism, proposed the combination of both mechanisms.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133