DocumentCode :
3425117
Title :
The protection for private keys in distributed computing system enabled by trusted computing platform
Author :
Shen, Zhidong ; Wu, Xiaoping
Author_Institution :
Int. Sch. of Software, Wuhan Univ., Wuhan, China
Volume :
5
fYear :
2010
fDate :
25-27 June 2010
Abstract :
Trusted computing technology, as a quickly developing technology in recent years, is helpful to improve the computer security and build a trusted computing environment for not only PC system but also distributed computing system. The core of trusted computing technology is cryptology. The trusted computing hardware provided a trusted root for upper layer applications and a trusted software interface is used to communicate with the trusted hardware. In this paper we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. The protection for private keys is based on the trusted computing platform with the trusted platform module. We give an example application to illustrate that the TPM enabled protection for key and credential can improve the security of distributed computer system.
Keywords :
distributed processing; private key cryptography; computer security; credential mechanism; cryptology; distributed computing system; private key protection; trusted computing platform; trusted software interface; upper layer application; Application software; Computer security; Cryptography; Distributed computing; Engines; Hardware; Information security; Protection; Random number generation; Software measurement; distributed computing system; key protection; trusted computing; trusted platform module;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Design and Applications (ICCDA), 2010 International Conference on
Conference_Location :
Qinhuangdao
Print_ISBN :
978-1-4244-7164-5
Electronic_ISBN :
978-1-4244-7164-5
Type :
conf
DOI :
10.1109/ICCDA.2010.5541169
Filename :
5541169
Link To Document :
بازگشت