Indexed by:
Abstract:
In order to prevent a malicious terminal of a group identifying itself and group fraud to others, in this paper, a TPM identification scheme based on threshold policy is presented. Its security is based on computational DH problem (CDHP) and K-CAA problem, which can effectively prevent a malicious terminal of a group identifying itself and group fraud to others. The scheme also fully takes into account the limited computing power of TPM to enhance its computing efficiency.
Keyword:
Reprint Author's Address:
Email:
Source :
Journal of Beijing University of Technology
ISSN: 0254-0037
Year: 2010
Issue: SUPPL. 2
Volume: 36
Page: 40-42
Cited Count:
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 0