DocumentCode :
58415
Title :
Teaching an Old TPM New Tricks: Repurposing for Identity-Based Signatures
Author :
Weihan Goh ; Chai Kiat Yeo
Author_Institution :
Nanyang Technol. Univ., Singapore, Singapore
Volume :
11
Issue :
5
fYear :
2013
fDate :
Sept.-Oct. 2013
Firstpage :
28
Lastpage :
35
Abstract :
A trusted platform module (TPM) is an industry-standard module bound to a system; it provides secure, cryptoprocessor functions such as asymmetric key generation and storage, asymmetric encryption/decryption, cryptographic hashing operations, and much more. Although it may seem useful, this module, ubiquitous in many OEM systems, is often underutilized or not utilized at all. This article presents a way to use the TPM as a secure key-generating authority in a Shamir identity-based signature scheme implementation. The authors demonstrate that the TPM can be used for more than what it´s usually documented for. If more such uses can be found, perhaps the TPM will no longer be underutilized.
Keywords :
digital signatures; microprocessor chips; public key cryptography; trusted computing; Shamir identity-based signature scheme; TPM; asymmetric encryption-decryption; asymmetric key generation; asymmetric key storage; cryptographic hashing operations; cryptoprocessor functions; industry-standard module; secure key-generating authority; trusted platform module; Computer security; Cryptography; Encryption; Handwriting recognition; Identity management; TPM; identity-based signatures; secure key generation; trusted platform module;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2013.53
Filename :
6515553
Link To Document :
بازگشت