Key management in trusted disk based on TPCM

被引:0
|
作者
Wang, Guan [1 ]
Wang, Bo [1 ]
Ruan, Fu-Sheng [1 ]
Liu, Zhi-Jun [1 ]
机构
[1] College of Computer Science, Beijing University of Technology, Beijing 100124, China
关键词
Trusted computing - Digital storage;
D O I
暂无
中图分类号
学科分类号
摘要
In TCG trusted storage specification, weak identification verification of password authentication and the lack of key protection mechanism are two problems. In this paper, the authors put forward a key management model of hard disk based on TPCM. Based on the model, the schemes of bidirectional authentication and authorization data protection are proposed to address the problems of identity authenticity and key confidentiality. And the credibility and safety of key management of trusted disk have been improved.
引用
收藏
页码:35 / 39
相关论文
共 50 条
  • [21] Self-organized key management with trusted certificate exchange in MANET
    John, Saju P.
    Samuel, Philip
    AIN SHAMS ENGINEERING JOURNAL, 2015, 6 (01) : 161 - 170
  • [22] Password management scheme based on trusted computing
    National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
    Beijing Youdian Daxue Xuebao, 2008, 5 (93-97):
  • [23] Multi-Tenant-Oriented Trusted Container Hierarchical Key Management Method
    Zhong, Qian
    Zhao, Bo
    An, Yang
    Li, Weidong
    Chen, Xifeng
    Shangguan, Chenhan
    Computer Engineering and Applications, 2024, 60 (12) : 283 - 293
  • [24] Trusted Group Key Management For Real-Time Critical Infrastructure Protection
    Jenkins, Jonathan
    Easton, Sean
    Guidry, David
    Burmester, Mike
    Liu, Xiuwen
    Yuan, Xin
    Lawrence, Joshua
    Ty, Sereyvathana
    2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013), 2013, : 248 - 253
  • [25] A Novel Threshold Key Management Scheme Based on Bilinear Pairing without a Trusted Party in Mobile Ad Hoc Network
    Meng, Xianyong
    Li, Yangmin
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 73 - 77
  • [26] Trusted computing encryption model based on XTR public key cryptosystem
    Zhou, Hua
    Journal of Computational Information Systems, 2015, 11 (12): : 4465 - 4472
  • [27] An attribute key distribution scheme based on low dependence trusted authorities
    Zhang X.
    Wang W.
    Lin J.
    Zhang, Xuewang (zhangxw@cqupt.edu.cn), 2018, Totem Publishers Ltd (14) : 2643 - 2651
  • [28] Trusted computing for disk drives and other peripherals
    Thibadeau, Robert
    IEEE SECURITY & PRIVACY, 2006, 4 (05) : 26 - 33
  • [29] Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT
    Xiang, Axin
    Gao, Hongfeng
    Tian, Youliang
    Wang, Linjie
    Xiong, Jinbo
    COMPUTER NETWORKS, 2024, 246
  • [30] Trusted e-commerce user agent based on USB Key
    Zhang, Dawei
    Hu, Peng
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 800 - 806