Abstract
Nowadays, anonymity and privacy protecting mechanisms are becoming more and more important. The anonymity of platforms and the privacy of users operating in the Internet are major concerns of current research activities. Although different techniques for protecting anonymity exist, standard protocols like Transport Layer Security are still missing adequate support for these technologies. In this paper, we analyze how Trusted Computing technologies and anonymous credential systems can be used in order to allow clients to establish anonymous authentication over secure channels. Furthermore, we analyze how these technologies can be integrated into common security frameworks like the Java Cryptography Architecture. We discuss the performance that can be achieved with this approach and analyse which performance can be expected from currently available Trusted Platform Modules.
Chapter PDF
References
Dierks, T., Rescorla, E.: R.I: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard) (August 2008)
Latze, C., Ultes-Nitsche, U., Baumgartner, F.: Extensible Authentication Protocol Method for Trusted Computing Groups (TCG) Trusted Platform Modules. Internet-Draft (July 2009)
Cesena, E., Ramunno, G., Vernizzi, D.: D03c.3 ssl/tls daa-enhancement specification. Technical report, Politecnico Di Torino (May 2009)
Trusted-Computing-Group-TSS-Working-Group: TCG Software Stack (TSS) Specification Version 1.2 Level 1. Part1: Commands and Structures (January 2006), Specification available online at, https://www.trustedcomputinggroup.org/specs/TSS/TSS_Version_1.2_Level_1_FINAL.pdf
IBM: TrouSerS The opensource TCG Software Stack (November 2, 2007)
Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous credentials on a standard java card. In: CCS ’09: Proceedings of the 16th ACM conference on Computer and communications security, pp. 600–610. ACM, New York (2009)
Trusted Computing Group - Mobile Phone Working Group: TCG Mobile Trusted Module Sepecification Version 1 rev. 1.0, Specification available online at, https://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-trusted-module-1.0.pdf (June 12, 2007)
Ekberg, J.E., Bugiel, S.: Trust in a small package: minimized mrtm software implementation for mobile secure environments. In: STC ’09: Proceedings of the 2009 ACM workshop on Scalable trusted computing, pp. 9–18. ACM, New York (2009)
Winter, J.: Trusted computing building blocks for embedded linux-based arm trustzone platforms. In: STC ’08: Proceedings of the 3rd ACM workshop on Scalable trusted computing, pp. 21–30. ACM, New York (2008)
Dietrich, K.: An Integrated Architecture for Trusted Computing for Java Enabled Embedded Devices. In: STC ’07: Proceedings of the 2007 ACM workshop on Scalable trusted computing, pp. 2–6. ACM Press, New York (2007)
Dietrich, K., Winter, J.: Implementation aspects of mobile and embedded trusted computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 29–44. Springer, Heidelberg (2009)
Mitchell, C.: Direct Anonymous Attestation in Context. In: Trusted Computing (Professional Applications of Computing), Piscataway, NJ, USA, pp. 143–174. IEEE Press, Los Alamitos (2005)
Trusted Computing Group - TPM Working Group: TPM Main Part 3 Commands, Specification available online at, https://www.trustedcomputinggroup.org/specs/TPM/mainP3Commandsrev103.zip (July 9, 2007) Specification version 1.2 Level 2 Revision 103
Dietrich, K.: Anonymous credentials for java enabled platforms. In: Chen, L., Yung, M. (eds.) INTRUST 2009, pp. 101–116 (2009)
Intel: Intel Desktop Board DQ965GF Technical Product Specification, Specification available at, downloadmirror.intel.com/15033/eng/DQ965GF_TechProdSpec.pdf (September 2006)
Intel: Intel Desktop Board DQ45CB Technical Product Specification, Specification available at, http://downloadmirror.intel.com/16958/eng/DQ45CB_TechProdSpec.pdf (September 2008)
SUN Microsystems: Java Cryptography Architecture (JCA) Reference Guide for JavaTM Platform Standard Edition 6, Specification available at, http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html
Stiftung SIC: The IAIK JCE iSaSiLk v4.4 TLS Library, Specification available at, http://jce.iaik.tugraz.at/index.php/sic/Products/Communication-Messaging-Security/iSaSiLk
Williams, D.E., Garcia, J.R.: Virtualization with Xen: including XenEnterprise, XenServer, and XenExpress. Syngress, Burlington, MA (c2007) Includes index
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dietrich, K. (2010). Anonymous Client Authentication for Transport Layer Security. In: De Decker, B., Schaumüller-Bichl, I. (eds) Communications and Multimedia Security. CMS 2010. Lecture Notes in Computer Science, vol 6109. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13241-4_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-13241-4_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13240-7
Online ISBN: 978-3-642-13241-4
eBook Packages: Computer ScienceComputer Science (R0)