One of the important technologies in trusted computing is secure storage. The key management is one of the important technologies in secure storage. However, there is a key synchronization problem in the existing key authorization management mechanism for Trusted Computing Platform. To solve the problem, we propose a log-based key authorization management scheme for trusted computing plaform. The new scheme can effectively enhance the trust and security of the trusted storage through constructing an information log for all the trusted keys.
展开▼