How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Practical forward secure group signature schemes
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Efficient Group Signature Schemes for Large Groups (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Proceedings of the 11th ACM conference on Computer and communications security
An IPSec-based key management algorithm for mobile IP networks
WSEAS TRANSACTIONS on COMMUNICATIONS
The benefits of PKI application and competitive advantage
WSEAS TRANSACTIONS on COMMUNICATIONS
A blind source separation based cryptography scheme for mobile military communication applications
WSEAS TRANSACTIONS on COMMUNICATIONS
Flexible authentication framework with bound authentication and authorization
WSEAS TRANSACTIONS on COMMUNICATIONS
A direct anonymous attestation scheme for embedded devices
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Hi-index | 0.00 |
Direct Anonymous Attestation (DAA) is a cryptographic mechanism adopted by the Trusted Computing Group in its specifications for trusted computing platforms (TCP). In this paper, we propose a new DAA scheme and prove it is secure under the strong RSA assumption and the decisional Diffie-Hellman assumption. While satisfying all the security properties proposed in previous DAA schemes, our scheme provides a new desired security property, forward security: compromise of the current private key of TPM does not enable an adversary to forge signatures pertaining to the past. Such forward security is important to mitigate the damage caused by private key exposure.