Implementation aspects of anonymous credential systems for mobile trusted platforms

  • Authors:
  • Kurt Dietrich;Johannes Winter;Granit Luzhnica;Siegfried Podesser

  • Affiliations:
  • Institute for Applied Information Processing and Communications Graz, University of Technology, Graz, Austria;Institute for Applied Information Processing and Communications Graz, University of Technology, Graz, Austria;Institute for Applied Information Processing and Communications Graz, University of Technology, Graz, Austria;Institute for Applied Information Processing and Communications Graz, University of Technology, Graz, Austria

  • Venue:
  • CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Anonymity and privacy protection are very important issues for Trusted Computing enabled platforms. Protection mechanisms are required in order to hide activities of the trusted platforms when performing cryptography based transactions over the Internet, which would otherwise compromise the platform's privacy and with it the users's anonymity. In order to address this problem, the Trusted Computing Group (TCG) has introduced two concepts addressing the question how the anonymity of Trusted Platform Modules (TPMs) and their enclosing platforms can be protected. The most promising of these two concepts is the Direct Anonymous Attestation (DAA) scheme which eliminates the requirement of a remote authority but includes complex mathematical computations. Moreover, DAA requires a comprehensive infrastructure consisting of various components in order to allow anonymous signatures to be used in real-world scenarios. In this paper, we discuss the results of our analysis of an infrastructure for anonymous credential systems which is focused on the Direct Anonymous Attestation (DAA) scheme as specified by the TCG. For the analysis, we especially focus on mobile trusted platforms and their requirements. We discuss our experiences and experimental results when designing and implementing the infrastructure and give suggestions for improvements and propose concepts and models for - from our point of view - missing components.