Figure 2: Timed Public-keys Protocol II In Figure 2. the protocol II is depicted. It is a protocol between a sender 5 (i.e.. the manufacturer in the scenario above), a receiver It (i.e., the laptop in the scenario above) and a TPM T on-board It. As we said, the aim of the protocol is that S sends securely a message to It. but S does not have It’s public key nor does it share a symmetric key with It. However, S does know the public key PubrrM of the TPM T found on board R. The channel/communication betwee
This is a real scenario when a sender S is. for instance, a laptop manufacturer and wishes to send the laptop It a specific update in a secure manner, but all cryptographic material that S has is a certificate (i.e., a public key) of the TPM (trusted platform module) it had placed on-board It. Below, … Read more