Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Simplified security notions of direct anonymous attestation and a concrete scheme from pairings

Published: 21 September 2009 Publication History

Abstract

Direct Anonymous Attestation (DAA) is a cryptographic mechanism that enables remote authentication of a user while preserving privacy under the user’s control. The DAA scheme developed by Brickell, Camenisch, and Chen has been adopted by the Trust Computing Group for remote anonymous attestation of Trusted Platform Module, which is a small hardware device with limited storage space and communication capability. In this paper, we provide two contributions to DAA. We first introduce simplified security notions of DAA including the formal definitions of user controlled anonymity and traceability. We then propose a new DAA scheme from elliptic curve cryptography and bilinear maps. The lengths of private keys and signatures in our scheme are much shorter than the lengths in the original DAA scheme, with a similar level of security and computational complexity. Our scheme builds upon the Camenisch–Lysyanskaya signature scheme and is efficient and provably secure in the random oracle model under the LRSW (stands for Lysyanskaya, Rivest, Sahai and Wolf) assumption and the decisional Bilinear Diffie–Hellman assumption.

Cited By

View all
  1. Simplified security notions of direct anonymous attestation and a concrete scheme from pairings

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image International Journal of Information Security
      International Journal of Information Security  Volume 8, Issue 5
      September 2009
      68 pages
      ISSN:1615-5262
      EISSN:1615-5270
      Issue’s Table of Contents

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 21 September 2009

      Author Tags

      1. Bilinear maps
      2. Direct anonymous attestation
      3. Trusted computing
      4. User-controlled-anonymity
      5. User-controlled-traceability

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 25 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Hash-Based Direct Anonymous AttestationPost-Quantum Cryptography10.1007/978-3-031-40003-2_21(565-600)Online publication date: 16-Aug-2023
      • (2022)A survey on Attribute-Based SignaturesJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2022.102396124:COnline publication date: 1-Mar-2022
      • (2021)Improving the security of direct anonymous attestation under host corruptionsInternational Journal of Information Security10.1007/s10207-020-00507-620:4(475-492)Online publication date: 1-Aug-2021
      • (2020)Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation SchemeProceedings of the 15th ACM Asia Conference on Computer and Communications Security10.1145/3320269.3372197(784-798)Online publication date: 5-Oct-2020
      • (2019)A Framework for Efficient Lattice-Based DAAProceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race10.1145/3338511.3357349(23-34)Online publication date: 15-Nov-2019
      • (2019)More efficient, provably-secure direct anonymous attestation from latticesFuture Generation Computer Systems10.1016/j.future.2019.04.03699:C(425-458)Online publication date: 1-Oct-2019
      • (2017)Enhanced security model and efficient construction for direct anonymous attestationInternational Journal of Internet Protocol Technology10.1504/IJIPT.2017.08303510:1(36-50)Online publication date: 1-Jan-2017
      • (2016)Universally Composable Direct Anonymous AttestationProceedings, Part II, of the 19th IACR International Conference on Public-Key Cryptography --- PKC 2016 - Volume 961510.1007/978-3-662-49387-8_10(234-264)Online publication date: 6-Mar-2016
      • (2015)Short Dynamic Group Signature Scheme Supporting Controllable LinkabilityIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.239049710:6(1109-1124)Online publication date: 1-Jun-2015
      • (2015)Formal analysis of privacy in Direct Anonymous Attestation schemesScience of Computer Programming10.1016/j.scico.2015.04.004111:P2(300-317)Online publication date: 1-Nov-2015
      • Show More Cited By

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media