• DocumentCode
    58415
  • Title

    Teaching an Old TPM New Tricks: Repurposing for Identity-Based Signatures

  • Author

    Weihan Goh ; Chai Kiat Yeo

  • Author_Institution
    Nanyang Technol. Univ., Singapore, Singapore
  • Volume
    11
  • Issue
    5
  • fYear
    2013
  • fDate
    Sept.-Oct. 2013
  • Firstpage
    28
  • Lastpage
    35
  • Abstract
    A trusted platform module (TPM) is an industry-standard module bound to a system; it provides secure, cryptoprocessor functions such as asymmetric key generation and storage, asymmetric encryption/decryption, cryptographic hashing operations, and much more. Although it may seem useful, this module, ubiquitous in many OEM systems, is often underutilized or not utilized at all. This article presents a way to use the TPM as a secure key-generating authority in a Shamir identity-based signature scheme implementation. The authors demonstrate that the TPM can be used for more than what it´s usually documented for. If more such uses can be found, perhaps the TPM will no longer be underutilized.
  • Keywords
    digital signatures; microprocessor chips; public key cryptography; trusted computing; Shamir identity-based signature scheme; TPM; asymmetric encryption-decryption; asymmetric key generation; asymmetric key storage; cryptographic hashing operations; cryptoprocessor functions; industry-standard module; secure key-generating authority; trusted platform module; Computer security; Cryptography; Encryption; Handwriting recognition; Identity management; TPM; identity-based signatures; secure key generation; trusted platform module;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSP.2013.53
  • Filename
    6515553