Securing the Distribution and Storage of Secrets with Trusted Platform Modules
نویسندگان
چکیده
We present a protocol that allows servers to securely distribute secrets to trusted platforms. The protocol maintains the confidentiality of secrets in the face of eavesdroppers and careless users. Given an ideal (tamper-proof) trusted platform, the protocol can even withstand attacks by dishonest users. As an example of its use, we present an application to secure document processing.
منابع مشابه
SDOS: Using Trusted Platform Modules for Secure Cryptographic Deletion in the Swift Object Store
The secure deletion of data is becoming increasingly important to individuals, corporations as well as governments. Recent advances in worldwide laws and regulations now require secure deletion for sensitive data in certain industries. Data leaks in the public and private sector are commonplace today, and they often reveal data which was supposed to be deleted. Secure deletion describes any mec...
متن کاملcTPM: A Cloud TPM for Cross-Device Trusted Applications
Current Trusted Platform Modules (TPMs) are illsuited for use in mobile services because they hinder sharing data across multiple devices seamlessly, they lack access to a trusted real-time clock, and their nonvolatile storage performs poorly. This paper presents cloud TPM (cTPM), an extension of the TPM’s design to address these problems. cTPM includes two features: 1) a cloud seed shared betw...
متن کاملOn Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of certain remote platforms, thereby enabling them to make decisions about the remote platforms’ trust status. Common concepts like Internet Protocol security or Transport Layer Security make these decisions based on shar...
متن کاملKey Management with Trusted Platform Modules
Key Management with Trusted Platform Modules The concept of Trusted Computing, which aims at making computing platforms more reliable, is based on a chip called Trusted Platform Module (TPM). The TPM is a chip which provides cryptographic functionality like RSA encryption and secure key storage. The aim of the Master’s project was to analyse and implement TPM based pre-boot authentication for t...
متن کاملLeveraging a Minimal Trusted Computing Base for Securing On-Demand MANET Routing Protocols
We propose an approach to secure on-demand mobile ad hoc network (MANET) routing protocols by leveraging low-complexity trustworthy MANET modules (TMM). Such TMMs, which perform some trivial hard-wired functions involving simple logical and hash operations, can be realized at low cost. We describe the functionality of such TMMs to offer a sound trusted computing base (TCB) for securing MANETs. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007