Handbook of Applied Cryptography
Handbook of Applied Cryptography
Java Virtual Machine Specification
Java Virtual Machine Specification
Efficient JavaVM Just-in-Time Compilation
PACT '98 Proceedings of the 1998 International Conference on Parallel Architectures and Compilation Techniques
Proceedings of the 11th ACM conference on Computer and communications security
DSD '07 Proceedings of the 10th Euromicro Conference on Digital System Design Architectures, Methods and Tools
An integrated architecture for trusted computing for java enabled embedded devices
Proceedings of the 2007 ACM workshop on Scalable trusted computing
A New Direct Anonymous Attestation Scheme from Bilinear Maps
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Implementation Aspects of Mobile and Embedded Trusted Computing
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Anonymous credentials on a standard java card
Proceedings of the 16th ACM conference on Computer and communications security
A signature scheme with efficient protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Anonymous RFID authentication using trusted computing technologies
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Lightweight anonymous authentication with TLS and DAA for embedded mobile devices
ISC'10 Proceedings of the 13th international conference on Information security
Implementation aspects of anonymous credential systems for mobile trusted platforms
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Seamless integration of trusted computing into standard cryptographic frameworks
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Hi-index | 0.00 |
Anonymity and privacy protection are very important issues for Trusted Computing enabled platforms. These topics are especially important when two platforms perform a remote attestation as specified by the Trusted Computing Group (TCG). Attestation requires a platform to prove its current platform configuration by cryptographic means. However, using common digital signature schemes requires a complex public key infrastructure and allows the verifier to track and identify the signing platform. In order to address this problem, the TCG has introduced two concepts how the anonymity of Trusted Platform Modules (TPMs), and with it the anonymity of certain platforms, can be protected. The most promising of these two concepts is the Direct Anonymous Attestation (DAA) scheme which eliminates the requirement of a remote authority but includes complex mathematical computations. In this paper, we address the question whether anonymous credential systems like DAA can be efficiently used on Java enabled platforms and resource constrained devices like mobile phones. In order to be able to investigate this situation, we developed a software library that supports the basic DAA processes setup, join, sign and verify for J2SE and J2ME based virtual machines. Although our results show that DAA can efficiently be used on desktop platforms, off-the-shelf mobile phones require some premises in order to use DAA adequately.