Nowadays, the mobile Internet brings along a lot of positive changes to our life, and at the same time it does lead to a lot of security concerns such as indiscriminate garbage information, stealing privacy information of threats to Internet security cases and so on. In order to better solve the security and privacy problems, we introduce the trusted computing into the current key management of the mobile internet. An effective distributed key management is presented in this paper, which is based on several technologies, such as TPM, RSA, (t, n) threshold cryptographic method, verifiable secret sharing and so on. Through security analyses, we can see that the proposed method gains several security attributions.
Read full abstract