Formal analysis of a TPM-based secrets distribution and storage scheme

Trusted computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise untrusted computer. The TPM can be used to restrict the use of cryptographic keys to trusted states, i.e., to situations in which the computer runs trusted software. This allows for the distribution of...

Full description

Saved in:
Bibliographic Details
Main Authors: Ronald Toegl, Georg Hofferek, Karin Greimel, Adrian Leung, Raphael C.-W. Phan, Roderick Bloem
Format: Default Conference proceeding
Published: 2008
Subjects:
Online Access:https://hdl.handle.net/2134/5693
Tags: Add Tag
No Tags, Be the first to tag this record!