Title :
The protection for private keys in distributed computing system enabled by trusted computing platform
Author :
Shen, Zhidong ; Wu, Xiaoping
Author_Institution :
Int. Sch. of Software, Wuhan Univ., Wuhan, China
Abstract :
Trusted computing technology, as a quickly developing technology in recent years, is helpful to improve the computer security and build a trusted computing environment for not only PC system but also distributed computing system. The core of trusted computing technology is cryptology. The trusted computing hardware provided a trusted root for upper layer applications and a trusted software interface is used to communicate with the trusted hardware. In this paper we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. The protection for private keys is based on the trusted computing platform with the trusted platform module. We give an example application to illustrate that the TPM enabled protection for key and credential can improve the security of distributed computer system.
Keywords :
distributed processing; private key cryptography; computer security; credential mechanism; cryptology; distributed computing system; private key protection; trusted computing platform; trusted software interface; upper layer application; Application software; Computer security; Cryptography; Distributed computing; Engines; Hardware; Information security; Protection; Random number generation; Software measurement; distributed computing system; key protection; trusted computing; trusted platform module;
Conference_Titel :
Computer Design and Applications (ICCDA), 2010 International Conference on
Conference_Location :
Qinhuangdao
Print_ISBN :
978-1-4244-7164-5
Electronic_ISBN :
978-1-4244-7164-5
DOI :
10.1109/ICCDA.2010.5541169