Improved Trusted Storage Key Authorization Management Scheme Based on Timestamp

被引:0
|
作者
Zhai, Guang-hui [1 ]
Li, Juan [1 ,2 ]
Song, Cheng [3 ]
机构
[1] Xuchang Univ, Sch Comp Sci & Technol, Xuchang 461000, Henan, Peoples R China
[2] Xuchang Univ, Sch Comp Sci & Technol, Xuchang 461000, Herts, Peoples R China
[3] Henan Polytechn Univ, Coll Comp Sci & Technol, Jiaozuo, Herts, Peoples R China
关键词
Key Synchronization; Trusted Storage; Authorization Dat;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the important functionalities in trusted computing platform is secure storage. Although the technologies about secure storage in trusted computing platform become more sophisticated, and the applications are increasingly popular, the key authorization management mechanism still needs further improvement. Aiming at the key synchronization problem of the key authorization data update in the existing schemes, we propose a timestamp-based trusted storage key management scheme. The proposed scheme can effectively solve the key synchronization problem and disadvantages in the existing schemes, so the trust and security of the trusted storage is further enhanced.
引用
收藏
页码:327 / +
页数:2
相关论文
共 50 条
  • [21] Security Enhancements of an Improved Timestamp-Based Remote User Authentication Scheme
    An, Younghwa
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 54 - 61
  • [22] An improved timestamp-based password authentication scheme using smart cards
    Pathan, Al-Sakib Khan
    Hong, Choong Seon
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 804 - +
  • [23] An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement
    Kumari, Saru
    Gupta, Mridul K.
    Khan, Muhammad Khurram
    Li, Xiong
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1921 - 1932
  • [24] A Trusted Recommendation Scheme based on the Improved Slope One Algorithm
    Yang, Li
    Wang, Xiaoqin
    Tian, Yaping
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 77 - 84
  • [25] A trusted computing model based on code authorization
    Wei, Guoheng
    Zhou, Xueguang
    Zhang, Huanguo
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 495 - +
  • [26] An Improved Scheme of μTESLA Authentication based Trusted Computing Platform
    Du, Ruiying
    Wen, Song
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4711 - 4714
  • [27] Novel hyper-combined public key based cloud storage key management scheme
    Song Ningning
    Chen Yueyun
    CHINA COMMUNICATIONS, 2014, 11 (02) : 185 - 194
  • [28] An attribute key distribution scheme based on low dependence trusted authorities
    Zhang X.
    Wang W.
    Lin J.
    Zhang, Xuewang (zhangxw@cqupt.edu.cn), 2018, Totem Publishers Ltd (14) : 2643 - 2651
  • [29] The key security management scheme of cloud storage based on blockchain and digital twins
    Huang, Jie
    Yi, Jiangyi
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [30] The key security management scheme of cloud storage based on blockchain and digital twins
    Huang, Jie
    Yi, Jiangyi
    Journal of Cloud Computing, 2024, 13 (01)