Abstract
This paper is motivated by the observation that existing security models for direct anonymous attestation (DAA) have problems to the extent that insecure protocols may be deemed secure when analysed under these models. This is particularly disturbing as DAA is one of the few complex cryptographic protocols resulting from recent theoretical advances actually deployed in real life. Moreover, standardization bodies are currently looking into designing the next generation of such protocols. Our first contribution is to identify issues in existing models for DAA and explain how these errors allow for proving security of insecure protocols. These issues are exhibited in all deployed and proposed DAA protocols (although they can often be easily fixed). Our second contribution is a new security model for a class of “pre-DAA scheme”, that is, DAA schemes where the computation on the user side takes place entirely on the trusted platform. Our model captures more accurately than any previous model the security properties demanded from DAA by the trusted computing group (TCG), the group that maintains the DAA standard. Extending the model from pre-DAA to full DAA is only a matter of refining the trust models on the parties involved. Finally, we present a generic construction of a DAA protocol from new building blocks tailored for anonymous attestation. Some of them are new variations on established ideas and may be of independent interest. We give instantiations for these building blocks that yield a DAA scheme more efficient than the one currently deployed, and as efficient as the one about to be standardized by the TCG which has no valid security proof.
Similar content being viewed by others
Notes
Note that repairing [4] to avoid our problem is trivial, and whether one considers our observation to be an “attack” depends on one’s view as to what a DAA protocol is meant to achieve. The motivation of the work in this paper is to clarify misunderstandings as to what the goals are.
Interestingly, most of the added complication is due to the TCG’s requirement that holders of secret keys should be able to revoke their key by publishing it on a list. Despite this being a requirement of the TCG, we are unsure how in practice a user would obtain the key (embedded in the TPM) so as to be able to revoke it.
References
Abe, M., Chow, S.S.M., Haralambiev, K., Ohkubo, M.: Double-Trapdoor Anonymous Tags for Traceable Signatures. Applied Cryptography and Network Security–ACNS 2011, LNCS 6715, pp. 183–200. Springer, Berlin (2011)
Ateniese, G., Camenisch, J., Hohenberger, S., de Medeiros, B.: Practical Group Signatures Without Random Oracles. Cryptology ePrint Archive. Report 2005/385, available at http://eprint.iacr.org/2005/385
Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable RFID Tags Via Insubvertible Encryption. Computer and Communications Security–CCS 2005, pp. 92–101. ACM Press, New york (2005)
Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. Computer and Communications Security–CCS 2004, pp. 132–145. ACM Press, New york (2004)
Brickell, E., Chen, L., Li, J.: A New Direct Anonymous Attestation Scheme from Bilinear Maps. Trusted Computing-Challenges and Applications–TRUST 2008, LNCS 4968, pp. 166–178. Springer, Berlin (2008)
Brickell, E., Chen, L., Li, J.: Simplified security notions for direct anonymous attestation and a concrete scheme from pairings. Int. J. Inf. Secur. 8, 315–330 (2009)
Brickell, E., Li, J.: Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities. Privacy in the Electronic Society–WPES 2007, pp. 21–30. ACM Press, New york (2007)
Brickell, E., Li, J.: Enhanced Privacy ID from Bilinear Pairing. Cryptology ePrint Archive. Report 2009/095, available at http://eprint.iacr.org/2009/095
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297–319 (2004)
Bellare, M., Micciancio, D., Warinschi, B.: Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. Advances in Cryptology-Eurocrypt 2003, LNCS 2656, pp. 614–629. Springer, Berlin (2003)
Boneh, D., Shacham, H.: Group Signatures with Verifier-Local Revocation. Computer and Communications Security–CCS 2004, pp. 168–177. ACM Press, New york (2004)
Bellare, M., Shi, H., Zhang, C.: Foundations of Group Signatures: The Case of Dynamic Groups. Topics in Cryptology–CT-RSA 2005, LNCS 3376, pp. 136–153. Springer, Berlin (2005)
Camenisch, J., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. Advances in Cryptology–CRYPTO 2004, LNCS 3152, pp. 56–72. Springer, Berlin (2004)
Canetti, R.: Universally Composable Signatures, Certification and Authentication. Cryptology ePrint Archive. Report 2003/239, available at http://eprint.iacr.org/2003/239
Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols (revised version of December 2005). Cryptology ePrint Archive. Report 2000/067, available at http://eprint.iacr.org/2000/067
Chase, M., Lysyanskaya, A.: On Signatures of Knowledge. Advances in Cryptology–CRYPTO 2006, LNCS 4117, pp. 78–96. Springer, Berlin (2006)
Chen, X., Feng, D.: Direct anonymous attestation for next generation TPM. J. Comput. 3, 43–50 (2008)
Chen, L.: A DAA scheme requiring less TPM resources. In: International Conference on Information Security and Cryptology–Inscrypt (2009)
Chen, L., Morrissey, P., Smart, N.P.: On proofs of Security of DAA Schemes. Provable Security–ProvSec 2008, LNCS 5324, pp. 167–175. Springer, Berlin (2008)
Chen, L., Morrissey, P., Smart, N.P.: Pairings in Trusted Computing. Pairings in Cryptography-Pairing 2008, LNCS 5209, pp. 1–17. Springer, Berlin (2008)
Chen, L., Morrissey, P., Smart, N.P.: DAA: Fixing the Pairing Based Protocols. Cryptology ePrint Archive. Report 2009/198, available at http://eprint.iacr.org/2009/198
Chen, L., Page, D., Smart, N.P.: On the Design and Implementation of an Efficient DAA Scheme. Smart Card Research and Advanced Application–CARDIS 2010, LNCS 6035, pp. 223–237. Springer, Berlin (2010)
Chen, L., Warinschi, B.: Security of the TCG Privacy-CA solution. Trusted Computing and Cmomunications–TrustCom 2010, pp. 609–616. IEEE (2010)
Chow, S.S.M.: Real Traceable Signatures. Selected Areas in Cryptography–SAC 2009, LNCS 5867, pp. 92–107. Springer, Berlin (2009)
Datta, A., Derek, A., Mitchell, J.C., Ramanathan, A., Scedrov, A.: Games and the Impossibility of Realizable Ideal Functionality. Theory of Cryptography Conference–TCC 2006, LNCS 3876, pp. 360–379. Springer, Berlin (2006)
Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Advances in Cryptology–CRYPTO 1986, LNCS 263, pp. 186–194. Springer, Berlin (1986)
Galbraith, S., Paterson, K., Smart, N.P.: Pairings for cryptographers. Discret. Appl. Math. 156, 3113–3121 (2008)
Ghadafi, E., Smart, N.P.: Efficient Two-Move Blind Signatures in the Common Reference String Model. Information Security–ISC 2012, LNCS 7483, pp. 274–289. Springer, Berlin (2012)
Green, M., Hohenberger, S.: Universally Composable Adaptive Oblivious Transfer. Advances in Cryptology–ASIACRYPT 2008, LNCS 5350, pp. 179–197. Springer, Berlin (2008)
Groth, J.: Fully Anonymous Group Signatures Without Random Oracles. Advances in Cryptology–ASIACRYPT 2007, LNCS 4833, pp. 164–180. Springer, Berlin (2007)
Juels, A., Luby, M., Ostrovsky, R.: Security of Blind Digital Signatures. Advances in Cryptology–CRYPTO ’97, LNCS 1294, pp. 150–164. Springer, Berlin (1997)
Liu, J.K., Wei, V.K., Wong, D.S.: Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups. Information Security and Privacy–ACISP 2004, LNCS 3108, pp. 325–335. Springer, Berlin (2004)
Lysyanskaya, A., Rivest, R., Sahai, A., Wolf, S.: Pseudonym Systems. Selected Areas in Cryptography–SAC 99, LNCS 1758, pp. 184–199. Springer, Berlin (1999)
Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)
Tsang, P.P., Au, M.H., Kapadia, A., Smith, S.W.: Blacklistable Anonymous Credentials: Blocking Misbehaving Users without ttps. Computer and Communications Security–CCS 2007, pp. 72–81. ACM Press, New york (2007)
Trusted Computing Group (TCG): TPM Specification 1.2. Available at http://www.trustedcomputinggroup.org (2003)
Acknowledgments
This work has been supported in part by the European Commission through the ICT Programme under Contract ICT-2007-216676 ECRYPT II, by an European Research Council Advanced Grant ERC-2010-AdG-267188-CRIPTO and by the Engineering and Physcial Sciences Research Council via grant EP/H043454/1. The fourth author has also been supported in part by a Royal Society Wolfson Merit Award.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bernhard, D., Fuchsbauer, G., Ghadafi, E. et al. Anonymous attestation with user-controlled linkability. Int. J. Inf. Secur. 12, 219–249 (2013). https://doi.org/10.1007/s10207-013-0191-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-013-0191-z