Secure Operations on Tree-Formed Verification Data

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

9 pages, 1 figure

Scientific paper

We define secure operations with tree-formed, protected verification data registers. Functionality is conceptually added to Trusted Platform Modules (TPMs) to handle Platform Configuration Registers (PCRs) which represent roots of hash trees protecting the integrity of tree-formed Stored Measurement Logs (SMLs). This enables verification and update of an inner node of an SML and even attestation to its value with the same security level as for ordinary PCRs. As an important application, it is shown how certification of SML subtrees enables attestation of platform properties.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Secure Operations on Tree-Formed Verification Data does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Secure Operations on Tree-Formed Verification Data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure Operations on Tree-Formed Verification Data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-134843

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.