Efficient Identity-Based Key Issue with TPM

In spite of many advantages the identity-based cryptosystem provides over traditional public key based cryptosystem, the paradigm requires frequently user authentication and secure channel for private key issue, which have handicapped its wide acceptance and restrict its usage to a small and closed groups where a central trusted authority exists and is easily accessible. In this paper we propose a framework based on the Trusted Computing (TC) techniques to improve the efficiency of private key issue in identity-based cryptosystem. We take the trusted platform module (TPM) as a local trusted authority for key extraction. The model, scheme and a survey on how to implement popular identity-based key issue on TPM are given. The security and performance analysis are provided, together with implementation issues for several popular identity-based cryptographic schemes.