1. TCG. TCG Specification: Architecture Overview,Version 14. 2007
2. TCG.TPM Main, Part 1 Design Principles. Specification Version 1.2 Revision103. 2007
3. TCG. Design, Implementation, and Usage Principles Version 2.0. 2005.
4. Shamir A. Identity-based cryptosystems and signature schemes. Proceedings of the 4th Annual International Cryptology Conference (Crypto’84), Aug 19-22, 1984, Santa Barbara, CA, USA. LNCS 196. Berlin, Germany: Springer-Verlag, 1985: 47-53
5. Waters B. Efficient identity-based encryption without random oracles. Advances in Cryptology: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’05), May 22-26, 2005, Aarhus, Denmark. LNCS 3984. Berlin, Germany: Springer-Verlag, 2005: 114-127
6. Paterson K G, Schuldt J C N. Efficient identity-based signatures secure in the standard model. Proceedings of the 11st Australasian Conference on Information Security and Privacy (ACISP’06), Jul 3-5, 2006, Melbourne, Australia. LNCS 4056. Berlin, Germany: Springer-Verlag, 2006: 207-222
7. Hess F. Efficient identity based signature schemes based on pairings. Proceedings of the 9th Workshop on Selected Areas in Cryptography (SAC’02), Aug 15-16, 2002, Newfoundland, Canada. LNCS 2595. Berlin, Germany: Springer-Verlag, 2002: 310-324
8. TCG. TPM Main, Part 2 TPM Structures. Specification Version 1.2 Revision103. 2007
9. Hankerson D, Menezes A, Vanstone S. Guide to elliptic curve cryptography. New York, NY, USA: Springer 2003
10. Boneh D, Franklin M. Identity based encryption from the Weil pairing. Proceedings of the 21st Annual International Cryptology Conference (Crypto’01), Aug 19-23, 2001, Santa Barbara, CA, USA. LNCS 2139. Berlin, Germany: Springer-Verlag, 2001: 231-229
11. Miller V S. The Weil pairing and its efficient calculation. Journal of Cryptology, 2004, 17(4): 235-261
12. Lenstra A K, Verheul E R. Selecting cryptographic key size. Journal of Cryptology, 2001, 14(4): 255-293
13. Vanstone S A. Elliptic curve cryptosystem—the answer to strong, fast public-key cryptography for securing constrained environments. Information Security Technical Report, 1997, 2(2): 78-87
14. TCG. TCG Software Stack (TSS) Specification Version 1.2. 2006.
15. TCG. TPM Main, Part 3 Commands. Specification Version 1.2 Revision 103. 2007 |