Title :
T-H key management model based on TPM
Author :
Jun Li ; Huiping Yu
Author_Institution :
Comput. Center, HeBei Univ., Baoding, China
Abstract :
The tree key management model of TCG specification needs to decrypt many layers keys while data need to be decrypted. And because there are very limited resources in TPM, it will lead to that the keys in the TPM are scheduled frequently while lots of keys are loaded into TPM. These cases will bring huge cost to the system. Based on this, the paper establish a T-H keys management model, in which the keys tree of tree key management model is pruned, at the same time, the hash algorithm is also introduced. And then the paper analyzes the efficiency and safety of T-H key management model.
Keywords :
cryptography; trees (mathematics); T-H key management model; TCG specification; TPM; hash algorithm; tree key management model; trusted computing group; Analytical models; Computational modeling; Cryptography; Data models; Educational institutions; Load modeling; TPM; hash key; key management; tree key;
Conference_Titel :
Information Management, Innovation Management and Industrial Engineering (ICIII), 2013 6th International Conference on
Conference_Location :
Xi´an
Print_ISBN :
978-1-4799-3985-5
DOI :
10.1109/ICIII.2013.6702919