MA-TEECM: Mutual Anonymous Authentication-Based Credential Migration Technology for Mobile Trusted Execution Environments
نویسندگان
چکیده
ARM TrustZone is the most widely used mobile trusted execution environment (TEE) technology today. Its hardware-enabled isolated provides reliable assurance of secure storage credentials in devices. However, research on managing stored TEE throughout lifecycle devices has received little attention recent years, and generally face usability problems caused by device events. Aiming at risk information disclosure third-party service providers traditional credential migration scheme, this paper presents a mutual anonymous authentication-based framework for environments. First, we propose peer-to-peer model between terminals based SGX, which solves single point failure attacks third parties that act as transfer stations managers solutions; Second, an identity authentication protocol TEEs authentication, detailed process designed universal model; Third, build formal verification using High-Level Protocol Specification Language (HLPSL). Finally, informal security analysis indicate improved scheme meets expected requirements against several known attacks.
منابع مشابه
Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms
Anonymity and privacy protection are very important issues for Trusted Computing enabled platforms. Protection mechanisms are required in order to hide activities of the trusted platforms when performing cryptography based transactions over the Internet, which would otherwise compromise the platform’s privacy and with it the users’s anonymity. In order to address this problem, the Trusted Compu...
متن کاملAuthentication Without Identification using Anonymous Credential System
Privacy and security are often intertwined. For example, identity theft is rampant because we have become accustomed to authentication by identification. To obtain some service, we provide enough information about our identity for an unscrupulous person to steal it (for example, we give our credit card number to Amazon.com). One of the consequences is that many people avoid e-commerce entirely ...
متن کاملTATA: Towards Anonymous Trusted Authentication
Mobile devices may share resources even in the presence of untrustworthy devices. To do so, each device may use a computational model that on input of reputation information produces trust assessments. Based on such assessments, the device then decides with whom to share: it will likely end up sharing only with the most trustworthy devices, thus isolating the untrustworthy ones. All of this is,...
متن کاملTrusted Anonymous Authentication Scheme for Trusted Network Connection in Mobile Environment
Technologies make the mobile terminals such as smart phones, PDAs and handsets much more powerful to access mobile network in recent years. Especially with the widely use of mobile terminals, mobile network now becomes a primary tool for daily and business interactions. However, the proliferation of mobile terminals also draws mobile malware’s attention which will do damage to the mobile termin...
متن کاملUsing Trusted Execution Environments in Two-factor Authentication: comparing approaches
Classic two-factor authentication has been around for a long time and has enjoyed success in certain markets (such as the corporate and the banking environment). A reason for this success are the stronger security properties, particularly where user interaction is concerned. These properties hinge on a security token being a physically separate device. This paper investigates whether Trusted Ex...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3235372