Formal analysis of a TPM-based secrets distribution and storage scheme
Trusted computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise untrusted computer. The TPM can be used to restrict the use of cryptographic keys to trusted states, i.e., to situations in which the computer runs trusted software. This allows for the distribution of...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Default Conference proceeding |
Published: |
2008
|
Subjects: | |
Online Access: | https://hdl.handle.net/2134/5693 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|