Acta Metallurgica Sinica(English letters) ›› 2010, Vol. 17 ›› Issue (4): 74-79.doi: 10.1016/S1005-8885(09)60491-X

• Artificial Intelligence • 上一篇    下一篇

Efficient ID-based TPM key loading scheme for trusted platform

宋成1,胡正名3,刘冰1,辛阳1,杨义先3,尹瀚2   

  1. 1. 北京邮电大学网络与交换技术国家重点实验室信息安全中心;北京邮电大学网络与信息攻防技术教育部重点实验室;北京邮电大学灾备技术国家工程实验室;北京安码科技有限公司
    2. 华为技术有限公司
    3. 北京邮电大学网络与交换技术国家重点实验室信息安全中心;北京邮电大学网络与信息攻防技术教育部重点实验室;北京邮电大学灾备技术国家工程实验室
  • 收稿日期:2009-09-27 修回日期:2010-01-20 出版日期:2010-08-30 发布日期:2010-08-31
  • 通讯作者: 宋成 E-mail:songcheng234@gmail.com
  • 基金资助:

    This work was supported by the National Basic Research Program of China (2007CB310704), the National Natural Science Foundation of China (60821001), the Hi-Tech Research and Development Program of China (2009AA01Z439).

Efficient ID-based TPM key loading scheme for trusted platform

SONG Cheng,LIU Bing, HU Zheng-min, XIN Yang, YANG Yi-xian, YIN Han   

  1. Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2009-09-27 Revised:2010-01-20 Online:2010-08-30 Published:2010-08-31
  • Supported by:

    This work was supported by the National Basic Research Program of China (2007CB310704), the National Natural Science Foundation of China (60821001), the Hi-Tech Research and Development Program of China (2009AA01Z439).

摘要:

One important function in trusted computing is protected storage, which can protect unlimited amount of data and keys. In the existing trusted platform module (TPM) key loading scheme for trusted platform, a computing platform with TPM as its trusted anchor, the total times of loading operation is the same as the number of the loaded target object’s ancestors, resulting in low efficiency of loading a TPM key which has many ancestors. To improve efficiency, an identity-based TPM key loading scheme is proposed. In this scheme, the times of loading operation is only two when any TPM key is loaded into TPM. Therefore, the required time cost for loading a TPM key can be reduced, especially for complex TPM key storage hierarchy. By analyzing the correctness, security, efficiency and feasibility, the proposed scheme has the better theoretical and application value.

关键词:

trusted computing, trusted platform module, protected storage, ID-based

Abstract:

One important function in trusted computing is protected storage, which can protect unlimited amount of data and keys. In the existing trusted platform module (TPM) key loading scheme for trusted platform, a computing platform with TPM as its trusted anchor, the total times of loading operation is the same as the number of the loaded target object’s ancestors, resulting in low efficiency of loading a TPM key which has many ancestors. To improve efficiency, an identity-based TPM key loading scheme is proposed. In this scheme, the times of loading operation is only two when any TPM key is loaded into TPM. Therefore, the required time cost for loading a TPM key can be reduced, especially for complex TPM key storage hierarchy. By analyzing the correctness, security, efficiency and feasibility, the proposed scheme has the better theoretical and application value.

Key words:

trusted computing, trusted platform module, protected storage, ID-based