PKC 2007: Public Key Cryptography – PKC 2007 pp 16-30 | Cite as
A Direct Anonymous Attestation Scheme for Embedded Devices
Abstract
Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. This paper presents an efficient construction that implements all anonymous authentication features specified in DAA, including authentication with total anonymity, authentication with variable anonymity, and rogue TPM tagging. The current DAA construction is mainly targeted for powerful devices such as personal computers, and their corresponding application areas, but is not entirely suitable for embedded devices with limited computing capabilities (e.g., cell phones or hand-held PDAs). We propose a new construction with more efficient sign and verify protocols, making it more attractive for embedded devices. We prove that the new construction is secure under the strong RSA assumption and the decisional Diffie-Hellman assumption.
Keywords
Direct Anonymous Attestation Group signature Privacy Authentication Trusted Computing Platform Cryptographic ProtocolReferences
- 1.Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255–270. Springer, Heidelberg (2000)CrossRefGoogle Scholar
- 2.Baric, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signature schemes without trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 480–494. Springer, Heidelberg (1997)Google Scholar
- 3.Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient procotols. In: First ACM Conference On computer and Communication Security, pp. 62–73. ACM Press, New York (1993)CrossRefGoogle Scholar
- 4.Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004)Google Scholar
- 5.Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: Proc. of the 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 168–177. ACM Press, New York (2004)CrossRefGoogle Scholar
- 6.Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: ACM Conference on Computer and Communications Security, pp. 132–145. ACM Press, New York (2004)Google Scholar
- 7.Camenisch, J., Groth, J.: Group signatures: Better efficiency and new theoretical aspects. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 120–133. Springer, Heidelberg (2005)Google Scholar
- 8.Camenisch, J., Michels, M.: A group signature scheme based on an RSA-variants. Technical Report RS-98-27, BRICS, University of Aarhus (Nov. 1998)Google Scholar
- 9.Camenisch, J., Stadler, M.: Efficient group signature schemems for large groups. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410–424. Springer, Heidelberg (1997)Google Scholar
- 10.Camenisch, J., Stadler, M.: A group signature scheme with improved efficiency. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 160–174. Springer, Heidelberg (1998)CrossRefGoogle Scholar
- 11.Chan, A., Frankel, Y., Tsiounis, Y.: Easy come - easy go divisible cash. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 561–574. Springer, Heidelberg (1998)CrossRefGoogle Scholar
- 12.Chaum, D., van Heyst, E.: Group signature. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 390–407. Springer, Heidelberg (1991)Google Scholar
- 13.ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)CrossRefGoogle Scholar
- 14.Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)Google Scholar
- 15.Fujisaki, E., Okamoto, T.: Statistical zero knowledge protocols to prove modular polynomial relations. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 16–30. Springer, Heidelberg (1997)Google Scholar
- 16.Fujisaki, E., Okamoto, T.: A practical and provably secure scheme for publicly verifable secret sharing and its applications. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 32–46. Springer, Heidelberg (1998)CrossRefGoogle Scholar
- 17.Kiayias, A., Tsiounis, Y., Yung, M.: Traceable signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 571–589. Springer, Heidelberg (2004)Google Scholar
- 18.Mao, W.: Modern Cryptography: Theory & Practice. Prentice Hall PTR, Englewood Cliffs (2004)Google Scholar
- 19.Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, pp. 613–619. CRC Press, Boca Raton (1997)MATHGoogle Scholar
- 20.Shamir, A.: On the generation of cryptograpically strong psedorandom sequences. ACM Transaction on computer systems 1 (1983)Google Scholar
- 21.
- 22.TCG. TPM V1.2 Specification Changes: A summary of changes with respect to the v1.1b TPM specification (2003)Google Scholar