DocumentCode :
1845304
Title :
Trusted Transmission Protocol for Content Security
Author :
Li, Li ; Zeng, Guosun ; Chen, Bo
Author_Institution :
Dept. of Comput. Sci. & Technol., Tongji Univ., Shanghai
fYear :
2008
fDate :
18-21 Nov. 2008
Firstpage :
1951
Lastpage :
1956
Abstract :
Classic message exchange based on asymmetric cryptography can protect message content from tampering and authenticate terminal by signing with the private key. Keys are communication endpoint spsila improperly managed keys can result in loss of security during content transmission. Additionally, improperly configured endpoints may also threaten content security of storage. Certainly the security can be enhanced by providing both security key management and terminalpsilas security authentication mechanisms. Those mechanisms can be obtained from trusted PC architecture specified by trusted computing group. So based on the new development of those mechanisms, such as property-based sealing, we adopted some cryptography schemes and initiated a security provably trusted transmission protocol, which not only enhances the content security during transmission, but also ensures content security of storage.
Keywords :
private key cryptography; protocols; asymmetric cryptography; classic message exchange; content security; security key management; terminal security authentication mechanisms; trusted computing group; trusted transmission protocol; Authentication; Computer architecture; Content management; Cryptographic protocols; Cryptography; Mechanical factors; Propagation losses; Protection; Secure storage; Security; Trusted computing; content security; property-based sealing; transmission protocol;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for
Conference_Location :
Hunan
Print_ISBN :
978-0-7695-3398-8
Electronic_ISBN :
978-0-7695-3398-8
Type :
conf
DOI :
10.1109/ICYCS.2008.242
Filename :
4709272
Link To Document :
بازگشت