Direct Anonymous Attestation Explained
نویسنده
چکیده
Assume that the user a trusted computing platform communicates with a verifier who wants to be assured that the user indeed uses a platform that can be trusted. trusted hardware module, This problem is called remote attestation and discussed in detail in Chapter ??. As described there, the problem in the end boils down to the problem that a trusted platform module (TPM) needs to prove that the attestation identity key (AIK) it has generated was indeed generated by an authentic trusted platform module. In principle, the TPM could use its endorsement key (EK) together with its certificate on this key to authenticate the AIK. However, the user wants her privacy protected and therefore requires that the verifier only learns that she uses a TPM but not which particular one – thus such a solution does not work as all her transactions would become linkable to each other by the EK. Another solution to the problem could be using any standard public key authentication scheme (or signature scheme): One would generate a secret/public key pair, and then embed the secret key into each TPM. The verifier and the TPM would then run the authentication protocol. Because all TPMs use the same key, they are indistinguishable. However, this approach would never work in practice: as soon as one hardware module (TPM) gets compromised and the secret key extracted and published, verifiers can no longer distinguish between real TPMs and fake ones. Therefore, detection of rogue TPMs needs to be a further requirement. The solution first developed by TCG uses a trusted third party, the socalled privacy certification authority (Privacy CA), and works as follows [25]. Each TPM generates an RSA key pair called an Endorsement Key (EK).
منابع مشابه
Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes
A definition of user-controlled anonymity is introduced for Direct Anonymous Attestation schemes. The definition is expressed as an equivalence property suited to automated reasoning using ProVerif and the practicality of the definition is demonstrated by examining the ECC-based Direct Anonymous Attestation protocol by Brickell, Chen & Li. We show that this scheme is secure under the assumption...
متن کاملFormal analysis of privacy in Direct Anonymous Attestation schemes
This article introduces a definition of privacy for Direct Anonymous Attestation schemes. The definition is expressed as an equivalence property which is suited to automated reasoning using Blanchet’s ProVerif. The practicality of the definition is demonstrated by analysing the RSA-based Direct Anonymous Attestation protocol by Brickell, Camenisch & Chen. The analysis discovers a vulnerability ...
متن کاملCovert Identity Information in Direct Anonymous Attestation (DAA)
Direct anonymous attestation (DAA) is a practical and efficient protocol for authenticated attestation with satisfaction of strong privacy requirements. This recently developed protocol is already adopted by the Trusted Computing Group and included in the standardized trusted platform module TPM. This paper shows that the main privacy goal of DAA can be violated by the inclusion of covert ident...
متن کاملA Method to Implement Direct Anonymous Attestation
In this report we present an efficient anonymous authentication scheme that works in a manner similarly to the so-called Direct Anonymous Attestation in the setting of the Trusted Computing Platform. Our construction implements features such as total anonymity, variable anonymity, and rogue TPM tagging. The new scheme is significantly simpler, and more efficient than the current solution that h...
متن کاملDirect Anonymous Attestation: Enhancing Cloud Service User Privacy
We introduce a privacy enhancing cloud service architecture based on the Direct Anonymous Attestation (DAA) scheme. In order to protect user data, the architecture provides cloud users with the abilities of controlling the extent of data sharing among their service accounts. A user is then enabled to link Cloud Service applications in such a way, that his/her personal data are shared only among...
متن کاملDirect Anonymous Attestation for Next Generation TPM
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme that allows a Trusted Platform Module (TPM) which is the core component of the trusted computing platform to remotely convince a communication partner that it is indeed a Trusted Platform Module while preserving the us...
متن کامل