Hardware-rooted trust for secure key management and transient trust

@inproceedings{Dwoskin2007HardwarerootedTF,
  title={Hardware-rooted trust for secure key management and transient trust},
  author={Jeffrey S. Dwoskin and Ruby B. Lee},
  booktitle={ACM Conference on Computer and Communications Security},
  year={2007}
}
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a central authority. Our authority-mode architecture has trust rooted in two critical secrets: a Device Root Key and a Storage Root Hash, initialized in the device by the trusted authority. Our architecture protects trusted software, bound to the device, which can use the root secrets to protect other sensitive information… CONTINUE READING
Highly Cited
This paper has 81 citations. REVIEW CITATIONS

8 Figures & Tables

Topics

Statistics

0510'07'08'09'10'11'12'13'14'15'16'17'18
Citations per Year

82 Citations

Semantic Scholar estimates that this publication has 82 citations based on the available data.

See our FAQ for additional information.