Implementation of ECC-based trusted platform module

Xing Zhang*, Ming Zhou, Jun Xi Zhuang, Jian Li

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

5 引用 (Scopus)

摘要

This paper analyzes the cryptography scheme of the Trust Platform Model(TPM). The focus of the discussion would be the comparison of elliptic curve cryptography and the nowadays widely used 2048-bit RSA in evaluating which would be better suited to be used on TPM. A TPM implementation scheme based on ECC is proposed, which includes encryption and decryption schemes, signature and verification scheme, key agreement scheme. Corresponding examples of TPM commands would also be given.

源语言英语
主期刊名Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, ICMLC 2007
2168-2173
页数6
DOI
出版状态已出版 - 2007
已对外发布
活动6th International Conference on Machine Learning and Cybernetics, ICMLC 2007 - Hong Kong, 中国
期限: 19 8月 200722 8月 2007

出版系列

姓名Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, ICMLC 2007
4

会议

会议6th International Conference on Machine Learning and Cybernetics, ICMLC 2007
国家/地区中国
Hong Kong
时期19/08/0722/08/07

指纹

探究 'Implementation of ECC-based trusted platform module' 的科研主题。它们共同构成独一无二的指纹。

引用此