Hash-based Direct Anonymous Attestation [PDF]
Direct Anonymous Attestation (DAA) was designed for the Trusted Platform Module (TPM) and versions using RSA and elliptic curve cryptography have been included in the TPM specifications and in ISO/IEC standards. These standardised DAA schemes have their security based on the factoring or discrete logarithm problems and are therefore insecure against ...
Liqun Chen +4 more
+5 more sources
Improved direct anonymous attestation scheme for mobile computing platforms
The security flaws of a direct anonymous attestation scheme proposed by Ge,et al.Were analyzed,and the re-sult shows that the authentication protocol of the scheme is vulnerable to reply attacks and platform masquerade attacks when being used for remote ...
Li YANG +3 more
doaj +3 more sources
Covert Identity Information in Direct Anonymous Attestation (DAA) [PDF]
Direct anonymous attestation (DAA) is a practical and efficient protocol for authenticated attestation with satisfaction of strong privacy requirements. This recently developed protocol is already adopted by the Trusted Computing Group and included in the standardized trusted platform module TPM.
Carsten Rudolph
openalex +3 more sources
k-times attribute-based authentication scheme using direct anonymous attestation
s: At present, the main drawbacks of existing k-times attribute-based authentication (abbreviated to k-TABA) schemes and related attribute-based authentication schemes are that the computation cost of the authentication process depends on the size of the
Xin LIU +3 more
doaj +3 more sources
VeloCash: Anonymous Decentralized Probabilistic Micropayments With Transferability
Micropayments are one of the challenges in cryptocurrencies. Micropayments on the blockchain have the problem that the fee is high for the transfer amount.
Taisei Takahashi +2 more
doaj +1 more source
The Role of Non-Positional Arithmetic on Efficient Emerging Cryptographic Algorithms
Number representation systems establish ways in which numbers are mapped to computer architectures, and how operations over the numbers are translated into computer instructions.
Paulo Martins, Leonel Sousa
doaj +1 more source
Direct anonymous authentication scheme for wireless networks under trusted computing
Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the
YANG Li1 +3 more
doaj +2 more sources
Lightweight multi-coupon system for multi-merchant environments with DAA
A multi-coupon system for multi-merchant environments was proposed by extending the DAA (direct anonymous attestation) scheme of Brickell etc.The new system bound the key elements in multi-coupon with the tamper-resistant TPM(trusted platform module)chip,
Xin LIU, Qiu-liang XU, Bo ZHANG
doaj +2 more sources
V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System [PDF]
Liquan Chen +4 more
openalex +1 more source
A Security Framework for Increasing Data and Device Integrity in Internet of Things Systems. [PDF]
Dirin A, Oliver I, Laine TH.
europepmc +1 more source

