Teaching an Old TPM New Tricks: Repurposing for Identity-Based Signatures
- 16 May 2013
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Security & Privacy
- Vol. 11 (5), 28-35
- https://doi.org/10.1109/msp.2013.53
Abstract
A trusted platform module (TPM) is an industry-standard module bound to a system; it provides secure, cryptoprocessor functions such as asymmetric key generation and storage, asymmetric encryption/decryption, cryptographic hashing operations, and much more. Although it may seem useful, this module, ubiquitous in many OEM systems, is often underutilized or not utilized at all. This article presents a way to use the TPM as a secure key-generating authority in a Shamir identity-based signature scheme implementation. The authors demonstrate that the TPM can be used for more than what it's usually documented for. If more such uses can be found, perhaps the TPM will no longer be underutilized.Keywords
This publication has 3 references indexed in Scilit:
- Security Proofs for Identity-Based Identification and Signature SchemesJournal of Cryptology, 2008
- Efficient Identity Based Signature Schemes Based on PairingsLecture Notes in Computer Science, 2003
- Identity-Based Cryptosystems and Signature SchemesPublished by Springer Science and Business Media LLC ,2000