2022 IEEE 15th International Conference on Cloud Computing (CLOUD) 2022
DOI: 10.1109/cloud55607.2022.00058
|View full text |Cite
|
Sign up to set email alerts
|

vTPM-SM: An Application Scheme of SM2/SM3/SM4 Algorithms Based on Trusted Computing in Cloud Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…The SM4 algorithm serves as a symmetric block cipher, adept at both data encryption and decryption, employing a 128-bit key and a 128-bit block size [20]. It was conceived by the State Cryptography Administration of China and was officially established as a national standard in 2012 [21].…”
Section: Sm4 Algorithmmentioning
confidence: 99%
“…The SM4 algorithm serves as a symmetric block cipher, adept at both data encryption and decryption, employing a 128-bit key and a 128-bit block size [20]. It was conceived by the State Cryptography Administration of China and was officially established as a national standard in 2012 [21].…”
Section: Sm4 Algorithmmentioning
confidence: 99%
“…This method can detect system components whose integrity is compromised in time, including attacks introduced through virtualization threats. The work is based on our previous work [29], but the previous work only focused on extending the cryptographic algorithm to the vTPM so that the virtual machine could use SM2/SM3/SM4 algorithm through the vTPM. Firstly, we enabled the PCR bank for SM3 algorithm and modified the BIOS and kernel source code to use SM3 algorithm in the trusted boot phase.…”
Section: Introductionmentioning
confidence: 99%