Skip to main content
Log in

The mechanism about key and credential on trusted computing platform and the application study

  • Cryptography
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Avizienis A, Laprie J C, Randell B,et al. Basic Concepts and Taxonomy of Dependable and Secure Computing [J].IEEE Transactions on Dependable and Secure Computing, 2004,1(1):11–33.

    Article  Google Scholar 

  2. Schechter S E, Greenstadt R A, Smith M D. Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment [C]//The Second Annual Workshop on Economics and Information Security, College Park, Maryland, May, 2003.

  3. Trusted Computing Group.Trusted Computing Platform Alliance (TCPA) Main Specification Version 1. 1b [R]. New York: TCG, 2003.

    Google Scholar 

  4. ISO/IEC.Information Technology-Open Systems Interconnection-Evaluation Criteria for Information Technology [S]. New York: Standard ISO/IEC 15408, 1999.

  5. Trusted Computing Group.TPM Main Part 1 Design Principles, Specification Version 1.2 [R]. New York: TCG, 2006.

    Google Scholar 

  6. Trusted Computing Group.TPM Main Part 2 TMP Structures, Specification Version 1.2 [R]. New York: TCG, 2006.

    Google Scholar 

  7. Foster I, Kesselman C, Tsudik G,et al. A Security Architecture for Computational Grids [C]//5th ACM Conference on Computer and Communications Security. Washington: ACM press, 1998:83.

    Google Scholar 

  8. Lorch M, Basney J, Kafura D. A Hardware-secured Credential Repository for Grid PKIs [C]//Proc of 4th IEEE/ACM International Symposium on Cluster Computing and the Grid. New York: IEEE Press, 2004:640.

    Google Scholar 

  9. Mao W. Daonity Specification Part I Design. [EB/OL]. [2006-02-20].https://forge.gridforum.org/project/tcrg.

  10. Jason R J M, González N E D. Privacy and Trusted Computing [C]//Proceedings of the 14th International Workshop on Database and Expert Systems Applications. New York: IEEE Press, 2003:383.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhang Huanguo.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60373087, 60473023, 90104005) and HP Laboratory of China

Biography: SHEN Zhidong (1975-), male, Ph. D. candidate, research direction; information security, trusted computing.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhidong, Z., Huanguo, Z., Miao, Z. et al. The mechanism about key and credential on trusted computing platform and the application study. Wuhan Univ. J. Nat. Sci. 11, 1641–1644 (2006). https://doi.org/10.1007/BF02831840

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831840

Key words

CLC number

Navigation