Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
1873529 | Physics Procedia | 2012 | 10 Pages |
Abstract
Trusted computing is a new requirement of information security, after the successful modern cryptography. Although there are many developments of methods and techniques to address on the problems of trusted computing, the lack of rigorous theoretic treatment makes it hard to give further mathematical treatment. In this paper, we develop theory and concepts of trusted computing founded on computational complexity, which analogies to modern cryptography and find close connections between trusted computing and one way functions, one of the pillars of the modern cryptography. After that, we reveal that trusted computing has a subtle but deep relation with software watermarking, that concept can be found on the concept of trusted computing.
Related Topics
Physical Sciences and Engineering
Physics and Astronomy
Physics and Astronomy (General)