Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Zero-knowledge undeniable signatures (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Composition and integrity preservation of secure reactive systems
Proceedings of the 7th ACM conference on Computer and communications security
Signature schemes based on the strong RSA assumption
ACM Transactions on Information and System Security (TISSEC)
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Gradual and Verifiable Release of a Secret
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Efficient Group Signature Schemes for Large Groups (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Signature schemes and applications to cryptographic protocol design
Signature schemes and applications to cryptographic protocol design
Security proofs for signature schemes
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Proving in zero-knowledge that a number is the product of two safe primes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Secure hash-and-sign signatures without the random oracle
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Efficient proofs that a committed number lies in an interval
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
A signature scheme with efficient protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Peer-to-peer access control architecture using trusted computing technology
Proceedings of the tenth ACM symposium on Access control models and technologies
Symmetric behavior-based trust: a new paradigm for internet computing
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance
IEEE Transactions on Dependable and Secure Computing
Discrete Applied Mathematics - Special issue: Coding and cryptography
A protocol for property-based attestation
Proceedings of the first ACM workshop on Scalable trusted computing
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
Proceedings of the first ACM workshop on Scalable trusted computing
Privacy-enhanced superdistribution of layered content with trusted access control
Proceedings of the ACM workshop on Digital rights management
User centricity: a taxonomy and open issues
Proceedings of the second ACM workshop on Digital identity management
Securing user inputs for the web
Proceedings of the second ACM workshop on Digital identity management
Unconditionally secure ring authentication
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Noninvasive Methods for Host Certification
ACM Transactions on Information and System Security (TISSEC)
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
Electronic Notes in Theoretical Computer Science (ENTCS)
Self-certified Sybil-free pseudonyms
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Turtles all the way down: research challenges in user-based attestation
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
User centricity: A taxonomy and open issues
Journal of Computer Security - The Second ACM Workshop on Digital Identity Management - DIM 2006
A trustworthy framework for impromptu service discovery with mobile devices
Mobility '07 Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology
DRM domain authentication using electronic payment systems
Proceedings of the 10th international conference on Electronic commerce
Universal Accumulators with Efficient Nonmembership Proofs
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
A New Direct Anonymous Attestation Scheme from Bilinear Maps
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA)
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Information Security and Cryptology
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Property-Based Attestation without a Trusted Third Party
ISC '08 Proceedings of the 11th international conference on Information Security
Proceedings of the 15th ACM conference on Computer and communications security
TwoKind authentication: protecting private information in untrustworthy environments
Proceedings of the 7th ACM workshop on Privacy in the electronic society
e-EMV: emulating EMV for internet payments with trusted computing technologies
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Remote attestation on legacy operating systems with trusted platform modules
Science of Computer Programming
On Proofs of Security for DAA Schemes
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
A PrivacyCA for Anonymity and Trust
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Revocable Group Signature Schemes with Constant Costs for Signing and Verifying
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Cryptographic Protocol Composition via the Authentication Tests
FOSSACS '09 Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures: Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009
On the Portability of Generalized Schnorr Proofs
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Privacy for Private Key in Signatures
Information Security and Cryptology
An Integrity Assurance Mechanism for Run-Time Programs
Information Security and Cryptology
Not-a-Bot: improving service availability in the face of botnet attacks
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Trusted Computing: Security and Applications
Cryptologia
Forward-Secure Group Signatures from Pairings
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Anonymous credentials on a standard java card
Proceedings of the 16th ACM conference on Computer and communications security
Harmony: holistic messaging middleware for event-driven systems
IBM Systems Journal
Discrete Applied Mathematics - Special issue: Coding and cryptography
An efficient direct anonymous attestation scheme with forward security
WSEAS TRANSACTIONS on COMMUNICATIONS
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
I am a sensor, and I approve this message
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Privacy-preserving credentials upon trusted computing augmented servers
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
A direct anonymous attestation scheme for embedded devices
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Securing the distribution and storage of secrets with trusted platform modules
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
A practical system for globally revoking the unlinkable pseudonyms of unknown users
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Ninja: non identity based, privacy preserving authentication for ubiquitous environments
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Simulatable VRFs with applications to multi-theorem NIZK
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Direct anonymous attestation (DAA): ensuring privacy with corrupt administrators
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Trusted computing: special aspects and challenges
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
CodeVoting protection against automatic vote manipulation in an uncontrolled environment
VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
Combating spam and denial-of-service attacks with trusted puzzle solvers
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
A self-certified and Sybil-free framework for secure digital identity domain buildup
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
SHIELDSTRAP: making secure processors truly secure
ICCD'09 Proceedings of the 2009 IEEE international conference on Computer design
Access control based on code identity for open distributed systems
TGC'07 Proceedings of the 3rd conference on Trustworthy global computing
Foundations of security analysis and design IV
A note on the Chen--Morrissey--Smart DAA scheme
Information Processing Letters
A card requirements language enabling privacy-preserving access control
Proceedings of the 15th ACM symposium on Access control models and technologies
Finite field arithmetic for cryptography
IEEE Circuits and Systems Magazine
Adaptive security management model in the cloud computing environment
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Anonymous authentication with TLS and DAA
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Group-based attestation: enhancing privacy and management in remote attestation
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
A DAA scheme using batch proof and verification
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
A pairing-based DAA scheme further reducing TPM resources
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
An anonymous attestation scheme with optional traceability
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Solving revocation with efficient update of anonymous credentials
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
A certifying compiler for zero-knowledge proofs of knowledge based on Σ-protocols
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Computational soundness of symbolic zero-knowledge proofs
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Untraceability and profiling are not mutually exclusive
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Anonymous RFID authentication using trusted computing technologies
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Automatic generation of sigma-protocols
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
An approach to introducing locality in remote attestation using near field communications
The Journal of Supercomputing
Small trusted primitives for dependable systems
ACM SIGOPS Operating Systems Review
A secure and practical approach for providing anonymity protection for trusted platforms
ICICS'10 Proceedings of the 12th international conference on Information and communications security
A forward secure direct anonymous attestation scheme
MMACTEE'09 Proceedings of the 11th WSEAS international conference on Mathematical methods and computational techniques in electrical engineering
Lightweight anonymous authentication with TLS and DAA for embedded mobile devices
ISC'10 Proceedings of the 13th international conference on Information security
A DAA scheme requiring less TPM resources
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Revocation for delegatable anonymous credentials
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
A Proposal for a Privacy-preserving National Identity Card
Transactions on Data Privacy
True trustworthy elections: remote electronic voting using trusted computing
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Group signatures are suitable for constrained devices
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Analysis of revocation strategies for anonymous Idemix credentials
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Implementation aspects of anonymous credential systems for mobile trusted platforms
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Trust extension as a mechanism for secure code execution on commodity computers
Trust extension as a mechanism for secure code execution on commodity computers
Direct anonymous attestation: enhancing cloud service user privacy
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part II
Trusted computing enhanced user authentication with OpenID and trustworthy user interface
International Journal of Internet Technology and Secured Transactions
An anonymous authentication scheme for identification card
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Transitive trust in mobile scenarios
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
A privacy-protecting coupon system
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Efficiency limitations for Σ-protocols for group homomorphisms
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
Reflections on trust: trust assurance by dynamic discovery of static properties
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Architectural support for hypervisor-secure virtualization
ASPLOS XVII Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems
Secure data management in trusted computing
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Tracing-by-linking group signatures
ISC'05 Proceedings of the 8th international conference on Information Security
A CDH-Based ring signature scheme with short signatures and public keys
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
A new RSA-based signature scheme
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Privacy-aware proof-carrying authorization
Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security
Improving remote voting security with codevoting
Towards Trustworthy Elections
k-times anonymous authentication with a constant proving cost
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Traceable signature: better efficiency and beyond
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Developing efficient blinded attribute certificates on smart cards via pairings
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
On the design and implementation of an efficient DAA scheme
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Anonymous credentials for java enabled platforms: a performance evaluation
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Key exchange with anonymous authentication using DAA-SIGMA protocol
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Revocation of direct anonymous attestation
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Interoperable remote attestation for VPN environments
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Interactive zero-knowledge with restricted random oracles
TCC'06 Proceedings of the Third conference on Theory of Cryptography
A framework for practical universally composable zero-knowledge protocols
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
The challenges raised by the privacy-preserving identity card
Cryptography and Security
Union and intersection types for secure protocol implementations
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
Hierarchical ECC-Based RFID authentication protocol
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Scalable group signatures with revocation
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Mutual remote attestation: enabling system cloning for TPM based platforms
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Specification and Standardization of a Java Trusted Computing API
Software—Practice & Experience
Policy-sealed data: a new abstraction for building trusted cloud services
Security'12 Proceedings of the 21st USENIX conference on Security symposium
A flexible software development and emulation framework for ARM trustzone
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Building general purpose security services on trusted computing
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Enforcing sticky policies with TPM and virtualization
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Anonymous ticketing for NFC-Enabled mobile phones
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
A (corrected) DAA scheme using batch proof and verification
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
DAA protocol analysis and verification
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Formal analysis of anonymity in ECC-Based direct anonymous attestation schemes
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Security of the enhanced TCG Privacy-CA solution
TGC'11 Proceedings of the 6th international conference on Trustworthy Global Computing
Auditable envelopes: tracking anonymity revocation using trusted computing
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Anonymous reputation based reservations in e-commerce (amnesic)
Proceedings of the 13th International Conference on Electronic Commerce
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols
Proceedings of the 2012 ACM conference on Computer and communications security
Using trustworthy host-based information in the network
Proceedings of the seventh ACM workshop on Scalable trusted computing
An approach to a trustworthy system architecture using virtualization
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Enhancing grid security using trusted virtualization
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Data-minimizing authentication goes mobile
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Packet-level attestation (PLA): A framework for in-network sensor data reliability
ACM Transactions on Sensor Networks (TOSN)
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
Security Verification of Hardware-enabled Attestation Protocols
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
Flexible and scalable digital signatures in TPM 2.0
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Efficient signatures of knowledge and DAA in the standard model
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Using ARM trustzone to build a trusted language runtime for mobile applications
Proceedings of the 19th international conference on Architectural support for programming languages and operating systems
Journal of Computer Security - Foundational Aspects of Security
Hi-index | 0.00 |
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group (TCG) as the method for remote authentication of a hardware module, called Trusted Platform Module (TPM), while preserving the privacy of the user of the platform that contains the module. DAA can be seen as a group signature without the feature that a signature can be opened, i.e., the anonymity is not revocable. Moreover, DAA allows for pseudonyms, i.e., for each signature a user (in agreement with the recipient of the signature) can decide whether or not the signature should be linkable to another signature. DAA furthermore allows for detection of "known" keys: if the DAA secret keys are extracted from a TPM and published, a verifier can detect that a signature was produced using these secret keys. The scheme is provably secure in the random oracle model under the strong RSA and the decisional Diffie-Hellman assumption.