Efficient Identity-Based Key Issue With TPM | |
Guan, Zhi ; Sun, Huiping ; Chen, Zhong ; Nan, Xianghao | |
2008 | |
关键词 | Key issue Identity-based cryptography RANDOM ORACLES ENCRYPTION SECURE |
英文摘要 | In spite of many advantages the identity-based cryptosystem provides over traditional public key based cryptosystem, the paradigm requires frequently user authentication and secure channel for private key issue, which have handicapped its wide acceptance and restrict its usage to a small and closed groups where a central trusted authority exists and is easily accessible. In this paper(1) we propose a framework based on the Trusted Computing (TC) techniques to improve the efficiency of private key issue in identity-based cryptosystem. We take the Trusted Platform Module (TPM) as a local trusted authority for key extraction. The model, scheme and a survey on how to implement popular identity-based key issue on TPM are given. The security and performance analysis are provided, together with implementation issues for several popular identity-based cryptographic schemes.; http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000269081801088&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=8e1609b174ce4e31116a60747a720701 ; Computer Science, Theory & Methods; EI; CPCI-S(ISTP); 1 |
语种 | 英语 |
DOI标识 | 10.1109/ICYCS.2008.523 |
内容类型 | 其他 |
源URL | [http://ir.pku.edu.cn/handle/20.500.11897/261156] |
专题 | 信息科学技术学院 |
推荐引用方式 GB/T 7714 | Guan, Zhi,Sun, Huiping,Chen, Zhong,et al. Efficient Identity-Based Key Issue With TPM. 2008-01-01. |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论