TPM BASED KEY BACKUP AND RECOVERY
This paper presents a secure solution to backup and recover keys with TPM based KMC (Key Management Center).By hardware protected capabilities and hardware protected storage provided by TPM, KMC can achieve the security goals of backuping and recovering keys for different platforms whereas securing them from being leaked out in a third party facility.To make the solution feasible and practicable, an algorithm based on the adjacency matrix that reflects the wrapping hierarchy among the keys to be protected by KMC is detailed.Through a Path Matrix for platform specific key branch, KMC can rapidly determine the path from SRK (Storage Root Key) to the target key and efficiently backup or recover the target key.
Trusted computing TPM Key backup and recover
XIAO-DONG ZUO WEI-PENG LIU
State Key Laboratory of Information Security (Graduate School of Chinese Academy of Sciences), Beijing, 100049, China
国际会议
2007 International Conference on Machine Learning and Cybernetics(IEEE第六届机器学习与控制论国际会议)
香港
英文
2164-2167
2007-08-19(万方平台首次上网日期,不代表论文的发表时间)