Indexed by:
Abstract:
Trusted computing has effectively solved the bottleneck problem of the traditional security technology, and it has become an important research area of the information security. Trusted cryptography module (TCM) is a must-have core module of cryptographic support platform for trusted computing, providing independent cryptographic algorithms. There are a great many of keys being managed in TCM, and TCM uses these keys to carry out its various functions. Platform Identification Key (PIK) plays an important role in the attestation to platform, platform integrity measurement and platform reporting process. In consequence, the security of PIK is directly related to the trusted platform security. By presenting the generation process of PIK in TCM, analyzing the advantages of the process, this paper posted corresponding solutions to the possible security risk in the process of PIK generation. It has effectively improved the safety of PIK generation process, greatly reduced the risk of exposure to private information.
Keyword:
Reprint Author's Address:
Email:
Source :
ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010)
Year: 2010
Page: 91-94
Language: English
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 8
Affiliated Colleges: