ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Application Authentication and Secure Key Management Scheme using MTM
Cited 0 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Jin-Hee Han, YongSeong Jeon, Jeongnyeo Kim
Issue Date
2014-12
Citation
International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), pp.941-946
Publisher
Springer
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1007/978-3-662-45402-2_133
Abstract
In mobile environments, application authentication is necessarily requested for providing secure service and managing transparently the source of application. In this paper, we propose an application authentication and key management for application using a Mobile Trusted Module (MTM). After application is normally authenticated using the expected value stored in MTM, we generate a Storage Root Key (SRK) to independently operate key management system for each application. SRK for each application is created as similar as take ownership process of a Trusted Platform Module (TPM) by using two hash values. Proposed scheme will solve the performance problem of a conventional MTM key management scheme and provide more secure environment as a consequence of key isolation between applications.
KSP Keywords
Key Management(KM), Key Management Scheme, Key Management System, Mobile trusted module, Secure Service, Storage root, expected value, hash value, mobile environment, trusted platform module