Improved Trusted Storage Key Authorization Management Scheme Based on Timestamp
One of the important functionalities in trusted computing platform is secure storage. Although the technologies about secure storage in trusted computing platform become more sophisticated, and the applications are increasingly popular, the key authorization management mechanism still needs further...
Saved in:
Published in | Communications and Information Processing Vol. 288; pp. 327 - 333 |
---|---|
Main Authors | , , |
Format | Book Chapter |
Language | English |
Published |
Germany
Springer Berlin / Heidelberg
2012
Springer Berlin Heidelberg |
Series | Communications in Computer and Information Science |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | One of the important functionalities in trusted computing platform is secure storage. Although the technologies about secure storage in trusted computing platform become more sophisticated, and the applications are increasingly popular, the key authorization management mechanism still needs further improvement. Aiming at the key synchronization problem of the key authorization data update in the existing schemes, we propose a timestamp-based trusted storage key management scheme. The proposed scheme can effectively solve the key synchronization problem and disadvantages in the existing schemes, so the trust and security of the trusted storage is further enhanced. |
---|---|
ISBN: | 9783642319648 3642319645 |
ISSN: | 1865-0929 1865-0937 |
DOI: | 10.1007/978-3-642-31965-5_39 |