Title :
Research of Privacy Protection Mechanism of TPM
Author :
Xueyong, Li ; Zhihui, Feng ; Junhui, Fu ; Wenxian, Xiao
Author_Institution :
Sch. of Inf. Eng., Henan Inst. of Sci. & Technol., Xinxiang, China
Abstract :
Introduced the credible computation´s background and analyzed the TCG organization had Issued two authentication standard agreement: The trusted third party agreement and the direct anonymous authentication agreement, practice prove that the direct anonymous authentication agreement cannot be under the very good control in actual anonymous, this article proposed the improvement mentality in the original foundation, and provides the reference for the later research.
Keywords :
data privacy; security of data; standards; TCG organization; TPM; authentication standard agreement; direct anonymous authentication agreement; privacy protection mechanism; trusted computing group; trusted platform module; trusted third party agreement; Authentication; Computational modeling; Computers; Privacy; Protocols; Public key; DDA; TPM; TTP; trusted computing;
Conference_Titel :
Information Technology and Applications (IFITA), 2010 International Forum on
Conference_Location :
Kunming
Print_ISBN :
978-1-4244-7621-3
Electronic_ISBN :
978-1-4244-7622-0
DOI :
10.1109/IFITA.2010.334