Efficient Identity-Based Key Issue With TPM

被引:0
作者
Guan, Zhi [1 ]
Sun, Huiping [1 ]
Chen, Zhong [1 ]
Nan, Xianghao [1 ]
机构
[1] Peking Univ, Sch EECS, Inst Software, Beijing, Peoples R China
来源
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5 | 2008年
关键词
Key issue; Identity-based cryptography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In spite of many advantages the identity-based cryptosystem provides over traditional public key based cryptosystem, the paradigm requires frequently user authentication and secure channel for private key issue, which have handicapped its wide acceptance and restrict its usage to a small and closed groups where a central trusted authority exists and is easily accessible. In this paper(1) we propose a framework based on the Trusted Computing (TC) techniques to improve the efficiency of private key issue in identity-based cryptosystem. We take the Trusted Platform Module (TPM) as a local trusted authority for key extraction. The model, scheme and a survey on how to implement popular identity-based key issue on TPM are given. The security and performance analysis are provided, together with implementation issues for several popular identity-based cryptographic schemes.
引用
收藏
页码:2354 / 2359
页数:6
相关论文
共 16 条
[1]  
[Anonymous], LECT NOTES COMPUTER
[2]  
[Anonymous], TRUST PLATF MOD TPM
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3152, P443
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[5]  
Boyen X., 2007, 5091 RFC
[6]  
Boyen X, 2007, LECT NOTES COMPUT SC, V4515, P394
[7]  
Cocks Clifford., 2001, IMA Int. Conf., V2260, P360, DOI DOI 10.1007/3-540-45325-3
[8]   Hierarchical ID-based cryptography [J].
Gentry, C ;
Silverberg, A .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 :548-566
[9]  
Goyal V, 2007, LECT NOTES COMPUT SC, V4622, P430
[10]   Efficient identity based signature schemes based on pairings [J].
Hess, F .
SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 :310-324