CORC  > 北京大学  > 信息科学技术学院
Efficient Identity-Based Key Issue With TPM
Guan, Zhi ; Sun, Huiping ; Chen, Zhong ; Nan, Xianghao
2008
关键词Key issue Identity-based cryptography RANDOM ORACLES ENCRYPTION SECURE
英文摘要In spite of many advantages the identity-based cryptosystem provides over traditional public key based cryptosystem, the paradigm requires frequently user authentication and secure channel for private key issue, which have handicapped its wide acceptance and restrict its usage to a small and closed groups where a central trusted authority exists and is easily accessible. In this paper(1) we propose a framework based on the Trusted Computing (TC) techniques to improve the efficiency of private key issue in identity-based cryptosystem. We take the Trusted Platform Module (TPM) as a local trusted authority for key extraction. The model, scheme and a survey on how to implement popular identity-based key issue on TPM are given. The security and performance analysis are provided, together with implementation issues for several popular identity-based cryptographic schemes.; http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000269081801088&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=8e1609b174ce4e31116a60747a720701 ; Computer Science, Theory & Methods; EI; CPCI-S(ISTP); 1
语种英语
DOI标识10.1109/ICYCS.2008.523
内容类型其他
源URL[http://ir.pku.edu.cn/handle/20.500.11897/261156]  
专题信息科学技术学院
推荐引用方式
GB/T 7714
Guan, Zhi,Sun, Huiping,Chen, Zhong,et al. Efficient Identity-Based Key Issue With TPM. 2008-01-01.
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace