Cheng Song;Bing Liu;正明 胡;Yang Xin;义先 杨;Han Yin
Beijing University of Posts and Telecommunications;Beijing Safe-Code Technology Co. Ltd.;China Association for Science and Technology;Huawei Technologies Co.; Ltd.
发表时间:2010-8
期 刊:Journal of China Universities of Posts and Telecommunications
语 言:English
U R L: http://www.scopus.com/inward/record.url?scp=77956573703&partnerID=8YFLogxK
One important function in trusted computing is protected storage, which can protect unlimited amount of data and keys. In the existing trusted platform module (TPM) key loading scheme for trusted platform, a computing platform with TPM as its trusted anchor, the total times of loading operation is the same as the number of the loaded target object's ancestors, resulting in low efficiency of loading a TPM key which has many ancestors. To improve efficiency, an identity-based TPM key loading scheme is proposed. In this scheme, the times of loading operation is only two when any TPM key is loaded into TPM. Therefore, the required time cost for loading a TPM key can be reduced, especially for complex TPM key storage hierarchy. By analyzing the correctness, security, efficiency and feasibility, the proposed scheme has the better theoretical and application value.
Scopus度量
年份 | CiteScore | SJR | SNIP |
---|---|---|---|
1996 | |||
1997 | |||
1998 | |||
1999 | |||
2000 | |||
2001 | |||
2002 | |||
2003 | |||
2004 | |||
2005 | |||
2006 | |||
2007 | 0.16 | 0.176 | |
2008 | 0.209 | 0.205 | |
2009 | 0.133 | 0.199 | |
2010 | 0.136 | 0.248 | |
2011 | 0.6 | 0.149 | 0.381 |
2012 | 0.6 | 0.147 | 0.358 |
2013 | 0.7 | 0.171 | 0.584 |
2014 | 0.6 | 0.156 | 0.53 |
2015 | 0.8 | 0.175 | 0.378 |
2016 | 0.9 | 0.167 | 0.432 |
2017 | 1 | 0.166 | 0.389 |
2018 | 1.1 | 0.179 | 0.463 |
2019 | 1.3 | 0.199 | 0.466 |
2020 | 0.7 | 0.133 | 0.172 |
2021 | 0.4 |
相似文献推荐