DocumentCode :
1847056
Title :
Efficient Identity-Based Key Issue with TPM
Author :
Guan, Zhi ; Sun, Huiping ; Chen, Zhong ; Nan, Xianghao
Author_Institution :
Inst. of Software, Peking Univ., Peking
fYear :
2008
fDate :
18-21 Nov. 2008
Firstpage :
2354
Lastpage :
2359
Abstract :
In spite of many advantages the identity-based cryptosystem provides over traditional public key based cryptosystem, the paradigm requires frequently user authentication and secure channel for private key issue, which have handicapped its wide acceptance and restrict its usage to a small and closed groups where a central trusted authority exists and is easily accessible. In this paper we propose a framework based on the Trusted Computing (TC) techniques to improve the efficiency of private key issue in identity-based cryptosystem. We take the trusted platform module (TPM) as a local trusted authority for key extraction. The model, scheme and a survey on how to implement popular identity-based key issue on TPM are given. The security and performance analysis are provided, together with implementation issues for several popular identity-based cryptographic schemes.
Keywords :
authorisation; public key cryptography; TPM; identity-based cryptosystem; identity-based key issue; public key based cryptosystem; trusted computing techniques; trusted platform module; user authentication; Authentication; Computer science education; Educational technology; Identity-based encryption; Information retrieval; Performance analysis; Public key; Public key cryptography; Security; Sun;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for
Conference_Location :
Hunan
Print_ISBN :
978-0-7695-3398-8
Electronic_ISBN :
978-0-7695-3398-8
Type :
conf
DOI :
10.1109/ICYCS.2008.523
Filename :
4709340
Link To Document :
بازگشت