Title :
Trust of User Using U-Key on Trusted Platform
Author :
Peng, Shuanghe ; Han, Zhen
Author_Institution :
Comput. Center, Beijing Inf. Sci. & Technol. Univ.
Abstract :
Trusted computing based on TPM can be viewed from the following several ways, i.e. trusted on user, trusted on platform, trusted on application and trusted between platforms. Even though trusted on user was mentioned in trusted computing architecture, it does not really address security from a user point of view, as the model is centered on the security of platform. User identification and authentication mechanism, are rather rudiment. Andreas Pashalidis and Chris J. Mitchell proposed a single sign on scheme using trusted platform in 2003, where platform attestation identity key is used as user identity. User identity is bound to his/her trusted platform, which makes it inconvenient to users. Mobility and flexibility are not achieved. Based on the rule of separation of user and platform credentials, trust of user using U-key technology on trusted platform is proposed in this paper. The proposed scheme can simplify the management of user and provide portability and flexibility to users
Keywords :
cryptography; U-key; authentication mechanism; trusted computing; trusted platform; user identification; user identity; user trust; Application software; Authentication; Computer architecture; Electronic mail; Hardware; Information science; Information security; Kernel; Operating systems; Software measurement;
Conference_Titel :
Signal Processing, 2006 8th International Conference on
Conference_Location :
Beijing
Print_ISBN :
0-7803-9736-3
Electronic_ISBN :
0-7803-9736-3
DOI :
10.1109/ICOSP.2006.346076