Abstract
In trusted computing, a Trusted Platform Module(TPM) is used to enhance the security of the platform. When the TPM proofs his identity to a remote verifier, the Direct Anonymous Attestation (DAA) method is adopted by the Trusted Computing Group(TCG) to provide anonymous authentication. But the original DAA scheme in TCG specifications can only work well in a single domain, which can not be used in multi domains directly. It is necessary to improve the single domain DAA to be available in multi domains. In this paper, we proposed a multi-domain DAA scheme, which is based on proxy signature and a pairings based DAA method. The proxy signature is used to delegate the trusted relationship and domain authentication, while the pairings based DAA method is used for the computation platform authentication when a trusted platform accessing another domain. Then the DAA authentication protocol is also designed. Finally, the analysis on the protocol are given, the results show that the proposed scheme is secure and effective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Trusted Computing Group. TCG specification architecture overview (2007), http://www.trustedcomputinggroup.org
Brichell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proc. of the 11th ACM Conf. on Computer and Communications Security, pp. 132–145. ACM, New York (2004)
Ge, H., Tate, S.R.: A direct anonymous attestation scheme for embedded devices. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 16–30. Springer, Heidelberg (2007)
Brickell, E., Chen, L., Li, J.: A new direct anonymous attestation scheme from bilinear maps. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) TRUST 2008. LNCS, vol. 4968, pp. 166–178. Springer, Heidelberg (2008)
Chen, L., Morrissey, P., Nigel, P., Smart, N.P.: Pairings in trusted computing. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 1–17. Springer, Heidelberg (2008)
Brickell, E., Chen, L., Li, J.: Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. Int. J. Information Security 8(5), 315–330 (2009)
Chen, X., Feng, D.: Direct anonymous attestation for next generation TPM. J. Computers 31(7), 1122–1129 (2008)
Yang, Y., Cao, L., Li, Z.: A Novel Direct Anonymous Attestation Protocol Based on Zero Knowledge Proof for Different Trusted Domains. China Communications 41(3), 54–61 (2010)
Sun, L., Chang, G., Sun, D.: A strict inter-domain anonymity attestation scheme. In: 2010 International Conference on Computer Design and Applications (ICCDA 2010), vol. 3, pp. 291–295. IEEE Press (2010)
Chen, L., Hu, A., Huang, J., Virkki, J.: A Lightweight Inter-domain Direct Anonymous Attestation Scheme for Machine-to-Machine Networks. In: Datta, A. (ed.) International Workshop on Cloud Computing and Information Security (CCIS 2013), pp. 545–550. Atlantis Press (2013)
Zhang, F., Safavi-Naini, R., Susilo, W.: An efficient signature scheme from bilinear pairings and its applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004)
Camenisch, J.L., Stadler, M.A.: Efficient group signature schemes for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997)
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems (Extended abstract). In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184–199. Springer, Heidelberg (2000)
Camenisch, J.L., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61–76. Springer, Heidelberg (2002)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Yang, L., Ma, J., Wang, W., Cao, C. (2014). Multi-domain Direct Anonymous Attestation Scheme from Pairings. In: Au, M.H., Carminati, B., Kuo, CC.J. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science, vol 8792. Springer, Cham. https://doi.org/10.1007/978-3-319-11698-3_47
Download citation
DOI: https://doi.org/10.1007/978-3-319-11698-3_47
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11697-6
Online ISBN: 978-3-319-11698-3
eBook Packages: Computer ScienceComputer Science (R0)