Key management in trusted disk based on TPCM

被引:0
|
作者
Wang, Guan [1 ]
Wang, Bo [1 ]
Ruan, Fu-Sheng [1 ]
Liu, Zhi-Jun [1 ]
机构
[1] College of Computer Science, Beijing University of Technology, Beijing 100124, China
关键词
Trusted computing - Digital storage;
D O I
暂无
中图分类号
学科分类号
摘要
In TCG trusted storage specification, weak identification verification of password authentication and the lack of key protection mechanism are two problems. In this paper, the authors put forward a key management model of hard disk based on TPCM. Based on the model, the schemes of bidirectional authentication and authorization data protection are proposed to address the problems of identity authenticity and key confidentiality. And the credibility and safety of key management of trusted disk have been improved.
引用
收藏
页码:35 / 39
相关论文
共 50 条
  • [31] ACC: Blockchain Based Trusted Management of Academic Credentials
    Reza, Md Suman
    Biswas, Sujit
    Alghamdi, Abdullah
    Alrizq, Mesfer
    Bairagi, Anupam Kumar
    Masud, Mehedi
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2021), 2021, : 438 - 443
  • [32] Algorithm for DNSSEC trusted key rollover
    Guette, G
    Cousin, B
    Fort, D
    INFORMATION NETWORKING: CONVERGENCE IN BROADBAND AND MOBILE NETWORKING, 2005, 3391 : 679 - 688
  • [33] Automating trusted key rollover in DNSSEC
    Guette, Gilles
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (06) : 839 - 854
  • [34] A Verifiable Dynamic Threshold Key Management Scheme Based on Bilinear Pairing without a Trusted Party in Mobile Ad Hoc Network
    Meng, Xianyong
    Li, Yangmin
    2012 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND LOGISTICS (ICAL), 2012, : 315 - 320
  • [35] DISTANT: DIStributed Trusted Authority-based key managemeNT for beyond 5G wireless mobile small cells
    De Ree, Marcus
    Mantas, Georgios
    Rodriguez, Jonathan
    Otung, Ifiok E.
    Verikoukis, Christos
    COMPUTER COMMUNICATIONS, 2021, 176 : 218 - 233
  • [36] Password-Based Authenticated Key Exchange without Centralized Trusted Setup
    Yoneyama, Kazuki
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 19 - 36
  • [37] Secure Optical Networks Based on Quantum Key Distribution and Weakly Trusted Repeaters
    Elkouss, David
    Martinez-Mateo, Jesus
    Ciurana, Alex
    Martin, Vicente
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2013, 5 (04) : 316 - 328
  • [38] A Trusted-based Cloud Computing Virtual Storage System and Key Technologies
    Wu, K. H.
    Chen, L.
    Li, Yi
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2015, 10 (04) : 579 - 592
  • [39] Efficient ID-based TPM key loading scheme for trusted platform
    Song C.
    Liu B.
    Hu Z.-M.
    Xin Y.
    Yang Y.-X.
    Yin H.
    Journal of China Universities of Posts and Telecommunications, 2010, 17 (04): : 74 - 79
  • [40] A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing
    Li, Ying
    Du, Liping
    Zhao, Guifen
    Feng, Fuwei
    INTELLIGENCE SCIENCE AND BIG DATA ENGINEERING: BIG DATA AND MACHINE LEARNING TECHNIQUES, ISCIDE 2015, PT II, 2015, 9243 : 407 - 412