Results 111 to 120 of about 404 (171)

Direct Anonymous Attestation With Optimal TPM Signing Efficiency

open access: closedIEEE Transactions on Information Forensics and Security, 2021
Direct Anonymous Attestation (DAA) is an anonymous signature scheme, which allows the Trusted Platform Module (TPM), a small chip embedded in a host computer, to attest to the state of the host system, while preserving the privacy of the user. DAA provides two signature modes: fully anonymous signatures and pseudonymous signatures.
Kang Yang   +5 more
openalex   +2 more sources

Trusted Attestation Key with Windows Management using Direct Anonymous Attestation Protocol

open access: closedInternational Journal of Communication and Networking System, 2015
E. Padma, S. Rajalakshmi
openalex   +2 more sources

Direct Anonymous Attestations with Dependent Basename Opening

open access: closed, 2014
We introduce a new privacy-friendly cryptographic primitive we call Direct Anonymous Attestations with Dependent Basename Opening (DAA-DBO). Such a primitive is a Direct Anonymous Attestation in which the anonymity can be revoked only if a specific authority, called the admitter, allowed to revoke the DAA signatures that include a specific basename. We
Nicolas Desmoulins   +3 more
openalex   +2 more sources

On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA) [PDF]

open access: closed, 2008
A possible privacy flaw in the TCG implementation of the Direct Anonymous Attestation (DAA) protocol has recently been discovered by Rudolph. This flaw allows a DAA Issuer to covertly include identifying information within DAA Certificates, enabling a colluding DAA Issuer and one or more verifiers to link and uniquely identify users, compromising user ...
Adrian Leung   +2 more
openalex   +11 more sources

A Direct Anonymous Attestation Scheme Based on Mimic Defense Mechanism

open access: closed2020 International Conference on Internet of Things and Intelligent Applications (ITIA), 2020
Machine-to-Machine (M2M) communication is a essential subset of the Internet of Things (IoT). Secure access to communication network systems by M2M devices requires the support of a secure and efficient anonymous authentication protocol. The Direct Anonymous Attestation (DAA) scheme in Trustworthy Computing is a verified security protocol. However, the
Yu Chen, Liquan Chen, Tianyu Lu
openalex   +2 more sources

DAA-A: Direct Anonymous Attestation with Attributes

open access: closed, 2015
The TPM 2.0 specification has been designed to support a new family of Elliptic Curve (EC) based Direct Anonymous Attestation (DAA) protocols. DAA protocols are limited to anonymous or pseudonymous attestations. But often a more flexible attestation would be needed.
Liqun Chen, Rainer Urian
openalex   +2 more sources

An Efficient Direct Anonymous Attestation without Encryption

2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control, 2013
DAA schemes are generally employed with the hardware of TPM to realize anonymous authentication. Basically, DAA schemes are based on group signatures. We propose a new DAA scheme based on a short group signature without encryption which departs from the traditional sign-encrypt-prove paradigm, and only adopts an anonymous signature and non-interactive ...
Chengdong Meng   +3 more
openaire   +1 more source

A New Direct Anonymous Attestation Scheme from Bilinear Maps

open access: closed2008 The 9th International Conference for Young Computer Scientists, 2008
The direct anonymous attestation scheme was proposed by Brickell, Jan Camenisch, Liqun Chen and was adopted by the trusted computing group in its specifications for trusted computing platforms. In this paper, We propose a new direct anonymous scheme from the bilinear maps based on the decisional Diffie-Hellman assumption and q-SDH assumption.
Ernie Brickell, Liqun Chen, Jiangtao Li
  +4 more sources

A new improved direct anonymous attestation scheme with enhanced anonymity

2011 Second International Conference on Mechanic Automation and Control Engineering, 2011
The Rudolph attacks, dictionary attacks in general password-based encrypted mechanism and replay attacks were analyzed in this paper. A new improved DAA scheme was proposed, it based on a bilinear pairing mechanism and Frequency Certificates, improved the JOIN and SIGNING protocol, and added a Trusted Synergic Third Party.
null Tao Xu   +3 more
openaire   +1 more source

Universally Composable Direct Anonymous Attestation

2016
Direct Anonymous Attestation DAA is one of the most complex cryptographic algorithms that has been deployed in practice. In spite of this and the long body of work on the subject, there is still no fully satisfactory security definition for DAA. This was already acknowledged by Bernard et al.
Jan Camenisch   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy