Results 1 to 10 of about 404 (171)

Hash-based Direct Anonymous Attestation [PDF]

open access: green, 2023
Direct Anonymous Attestation (DAA) was designed for the Trusted Platform Module (TPM) and versions using RSA and elliptic curve cryptography have been included in the TPM specifications and in ISO/IEC standards. These standardised DAA schemes have their security based on the factoring or discrete logarithm problems and are therefore insecure against ...
Liqun Chen   +4 more
  +5 more sources

Improved direct anonymous attestation scheme for mobile computing platforms

open access: yesTongxin xuebao, 2013
The security flaws of a direct anonymous attestation scheme proposed by Ge,et al.Were analyzed,and the re-sult shows that the authentication protocol of the scheme is vulnerable to reply attacks and platform masquerade attacks when being used for remote ...
Li YANG   +3 more
doaj   +3 more sources

Covert Identity Information in Direct Anonymous Attestation (DAA) [PDF]

open access: bronze, 2007
Direct anonymous attestation (DAA) is a practical and efficient protocol for authenticated attestation with satisfaction of strong privacy requirements. This recently developed protocol is already adopted by the Trusted Computing Group and included in the standardized trusted platform module TPM.
Carsten Rudolph
openalex   +3 more sources

k-times attribute-based authentication scheme using direct anonymous attestation

open access: yesTongxin xuebao, 2018
s: At present, the main drawbacks of existing k-times attribute-based authentication (abbreviated to k-TABA) schemes and related attribute-based authentication schemes are that the computation cost of the authentication process depends on the size of the
Xin LIU   +3 more
doaj   +3 more sources

VeloCash: Anonymous Decentralized Probabilistic Micropayments With Transferability

open access: yesIEEE Access, 2022
Micropayments are one of the challenges in cryptocurrencies. Micropayments on the blockchain have the problem that the fee is high for the transfer amount.
Taisei Takahashi   +2 more
doaj   +1 more source

The Role of Non-Positional Arithmetic on Efficient Emerging Cryptographic Algorithms

open access: yesIEEE Access, 2020
Number representation systems establish ways in which numbers are mapped to computer architectures, and how operations over the numbers are translated into computer instructions.
Paulo Martins, Leonel Sousa
doaj   +1 more source

Direct anonymous authentication scheme for wireless networks under trusted computing

open access: yesTongxin xuebao, 2010
Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the
YANG Li1   +3 more
doaj   +2 more sources

Lightweight multi-coupon system for multi-merchant environments with DAA

open access: yesTongxin xuebao, 2016
A multi-coupon system for multi-merchant environments was proposed by extending the DAA (direct anonymous attestation) scheme of Brickell etc.The new system bound the key elements in multi-coupon with the tamper-resistant TPM(trusted platform module)chip,
Xin LIU, Qiu-liang XU, Bo ZHANG
doaj   +2 more sources

V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System [PDF]

open access: hybrid, 2021
Liquan Chen   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy