Teaching an Old TPM New Tricks: Repurposing for Identity-Based Signatures

被引:1
作者
Goh, Weihan [1 ]
Yeo, Chai Kiat [2 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
关键词
identity-based signatures; secure key generation; TPM; trusted platform module;
D O I
10.1109/MSP.2013.53
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trusted platform modules (TPMs) provide secure cryptoprocessor functions, but they're often underutilized or not utilized at all. Using a TPM as a secure key-generating authority in a Shamir identity-based signature scheme demonstrates a new use for it that could put TPMs in the spotlight.
引用
收藏
页码:28 / 35
页数:8
相关论文
共 14 条
[1]  
[Anonymous], 2003, PUBL KEY CRYPT STAND
[2]  
[Anonymous], 2009, BITLOCKER DRIV ENCR
[3]  
[Anonymous], 2006, US ARM REQ TRUST COM
[4]  
Ashford W., 2012, COMPUTERWEEKLY 0612
[5]   Security Proofs for Identity-Based Identification and Signature Schemes [J].
Bellare, Mihir ;
Namprempre, Chanathip ;
Neven, Gregory .
JOURNAL OF CRYPTOLOGY, 2009, 22 (01) :1-61
[6]  
Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18
[7]  
Challener D., 2011, PROGRAMMING TROUSERS
[8]  
Challener David., 2008, PRACTICAL GUIDE TRUS
[9]  
DUNN A., 2011, Proceedings of the 29th USENIX Conference on Security, P26
[10]  
Fiat Amos., 1986, CRYPTO, V263, P186