Skip to main content

2014 | OriginalPaper | Buchkapitel

12. Direct Anonymous Attestation (DAA) in More Depth

verfasst von : Graeme Proudler, Liqun Chen, Chris Dalton

Erschienen in: Trusted Computing Platforms

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Direct Anonymous Attestation is TPM2’s method of providing mathematically-proven anonymity or pseudonymity for signing keys in trusted platforms. The simple explanation of how DAA works is that it has a single verification (public) key but a plethora of signing (private) keys. One cannot tell which of many platforms created the signature. This chapter provides a more thorough explanation and enables one to understand (amongst other things) why one can’t tell whether two anonymous DAA signatures were created under the same private key, but can tell whether two pseudonymous DAA signatures were created under the same private key. This chapter is intended for readers with a background or interest in mathematics and/or cryptography.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
[BMU08]
Zurück zum Zitat Backes, M., Maffei, M., Unruh, D.: Zero knowledge in the applied Pi–calculus and automated verification of the direct anonymous attestation protocol. In: IEEE Symposium on Security and Privacy – SSP 2008, pp. 202–215 (2008) Backes, M., Maffei, M., Unruh, D.: Zero knowledge in the applied Pi–calculus and automated verification of the direct anonymous attestation protocol. In: IEEE Symposium on Security and Privacy – SSP 2008, pp. 202–215 (2008)
[BLP05]
Zurück zum Zitat Balfe, S., Lakhani, A.D., Paterson, K.G.: Securing peer-to-peer networks using Trusted Computing. In: Mitchell, C. (ed.) Trusted Computing, pp. 271–298. IEEE, London (2005) Balfe, S., Lakhani, A.D., Paterson, K.G.: Securing peer-to-peer networks using Trusted Computing. In: Mitchell, C. (ed.) Trusted Computing, pp. 271–298. IEEE, London (2005)
[BFGS11]
[BCC04]
Zurück zum Zitat Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: The 11th ACM Conference on Computer and Communications Security, pp. 132–145. ACM Press (2004) Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: The 11th ACM Conference on Computer and Communications Security, pp. 132–145. ACM Press (2004)
[BCC05]
Zurück zum Zitat Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation in context. In: Mitchell, C (ed.) Trusted Computing, pp. 143–174. IEEE, London (2005) Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation in context. In: Mitchell, C (ed.) Trusted Computing, pp. 143–174. IEEE, London (2005)
[BCL09]
Zurück zum Zitat [BCL09] Brickell, E., Chen, L., Li, J.: Simplified security notions for direct anonymous attestation and a concrete scheme from pairings. Int. Journal of Information Security 8, 315–330 (2009) [BCL09] Brickell, E., Chen, L., Li, J.: Simplified security notions for direct anonymous attestation and a concrete scheme from pairings. Int. Journal of Information Security 8, 315–330 (2009)
[BCL08]
Zurück zum Zitat [BCL08] Brickell, E., Chen, L., Li, J.: A new direct anonymous attestation scheme from bilinear maps. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trusted Computing - Challenges and Applications, proc. TRUST 2008. LNCS, vol. 4968, pp. 166–178. Springer, Heidelberg (2008) [BCL08] Brickell, E., Chen, L., Li, J.: A new direct anonymous attestation scheme from bilinear maps. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trusted Computing - Challenges and Applications, proc. TRUST 2008. LNCS, vol. 4968, pp. 166–178. Springer, Heidelberg (2008)
[BL07]
Zurück zum Zitat [BL07] Brickell, E., Li, J.: Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities. In: Yu, T. (ed.) The 6th ACM Workshop on Privacy in the Electronic Society – WPES 2007, pp. 21–30. ACM Press (2007) [BL07] Brickell, E., Li, J.: Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities. In: Yu, T. (ed.) The 6th ACM Workshop on Privacy in the Electronic Society – WPES 2007, pp. 21–30. ACM Press (2007)
[BL10]
Zurück zum Zitat [BL10] Brickell, E., Li, J.: A pairing-based DAA scheme further reducing TPM resources. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) Trust 2010, LNCS 6101, pp. 181-195, Springer, Heidelberg (2010) [BL10] Brickell, E., Li, J.: A pairing-based DAA scheme further reducing TPM resources. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) Trust 2010, LNCS 6101, pp. 181-195, Springer, Heidelberg (2010)
[CG05]
Zurück zum Zitat [CG05] Camenisch, J., Groth, J.: Group signatures: better efficiency and new theoretical aspects. In: Blundo, C., Cimato, S. (eds.) Security in Communication Networks, SCN 2004. LNCS, vol. 3352, pp. 120–133. Springer, Heidelberg (2005) [CG05] Camenisch, J., Groth, J.: Group signatures: better efficiency and new theoretical aspects. In: Blundo, C., Cimato, S. (eds.) Security in Communication Networks, SCN 2004. LNCS, vol. 3352, pp. 120–133. Springer, Heidelberg (2005)
[CL04]
Zurück zum Zitat [CL04] Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) Advances in Cryptology, CRYPTO 2004. LNCS, vol. 3152, pp. 56–72. Springer, Heidelberg (2004) [CL04] Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) Advances in Cryptology, CRYPTO 2004. LNCS, vol. 3152, pp. 56–72. Springer, Heidelberg (2004)
[Ch09]
Zurück zum Zitat [Ch09] Chen, L.: A DAA scheme requiring less TPM resources. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Information Security and Cryptology, Inscrypt 2009. LNCS, vol. 6151, pp. 350–365. Springer, Heidelberg (2010); the full paper is in Cryptology ePrint Archive. Report 2010/008, http://eprint.iacr.org/2010/008 (visited April 2014) [Ch09] Chen, L.: A DAA scheme requiring less TPM resources. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Information Security and Cryptology, Inscrypt 2009. LNCS, vol. 6151, pp. 350–365. Springer, Heidelberg (2010); the full paper is in Cryptology ePrint Archive. Report 2010/008, http://​eprint.​iacr.​org/​2010/​008 (visited April 2014)
[Ch10]
Zurück zum Zitat [Ch10] Chen, L.: A DAA scheme using batch proof and verification.In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) Trust and Trustworthy Computing, Proc. TRUST 2010. LNCS, vol. 6101, pp. 166–180. Springer, Heidelberg (2010) [Ch10] Chen, L.: A DAA scheme using batch proof and verification.In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) Trust and Trustworthy Computing, Proc. TRUST 2010. LNCS, vol. 6101, pp. 166–180. Springer, Heidelberg (2010)
[CLW11]
Zurück zum Zitat [CLW11] Chen, L., Lee, M., Warinschi, B.: Security of the enhanced TCG privacy-CA solution. In: Proceedings of the 6th International Symposium on Trustworthy Global Computing (TGC 2011) [CLW11] Chen, L., Lee, M., Warinschi, B.: Security of the enhanced TCG privacy-CA solution. In: Proceedings of the 6th International Symposium on Trustworthy Global Computing (TGC 2011)
[CL10a]
Zurück zum Zitat [CL10a] Chen, L., Li, J.: A note on the Chen-Morrissey-Smart DAA scheme. Inf. Process. Lett. 110(12-13): 485-488 (2010) [CL10a] Chen, L., Li, J.: A note on the Chen-Morrissey-Smart DAA scheme. Inf. Process. Lett. 110(12-13): 485-488 (2010)
[CL10b]
Zurück zum Zitat [CL10b] Chen, L., Li, J. Revocation of direct anonymous attestation. In: Proc. of 2nd International Conference on Trusted Systems, INTRUST 2010. LNCS, vol.6802, pp. 128-147, Springer, Heidelberg (2010) [CL10b] Chen, L., Li, J. Revocation of direct anonymous attestation. In: Proc. of 2nd International Conference on Trusted Systems, INTRUST 2010. LNCS, vol.6802, pp. 128-147, Springer, Heidelberg (2010)
[CF08]
Zurück zum Zitat [CF08] Chen, X., Feng, D.: Direct anonymous attestation for next generation TPM. Journal of Computers 3(12), 43–50 (2008) [CF08] Chen, X., Feng, D.: Direct anonymous attestation for next generation TPM. Journal of Computers 3(12), 43–50 (2008)
[CMS08a]
Zurück zum Zitat [CMS08a] Chen, L., Morrissey, P., Smart, N.P.: Pairings in Trusted Computing. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing-Based Cryptography - Pairing 2008. LNCS, vol. 5209, pp. 1–17. Springer, Heidelberg (2008) [CMS08a] Chen, L., Morrissey, P., Smart, N.P.: Pairings in Trusted Computing. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing-Based Cryptography - Pairing 2008. LNCS, vol. 5209, pp. 1–17. Springer, Heidelberg (2008)
[CMS08b]
Zurück zum Zitat [CMS08b] Chen, L., Morrissey, P., Smart, N.P.: On proofs of security for DAA schemes. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.)Provable Security, Proc. ProvSec 2008. LNCS, vol. 5324, pp. 156–175. Springer, Heidelberg (2008) [CMS08b] Chen, L., Morrissey, P., Smart, N.P.: On proofs of security for DAA schemes. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.)Provable Security, Proc. ProvSec 2008. LNCS, vol. 5324, pp. 156–175. Springer, Heidelberg (2008)
[CPS10]
Zurück zum Zitat [CPS10] Chen, L., Page, D., Smart, N.P.: On the design and implementation of an efficient DAA scheme. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) Smart Card Research and Advanced Applications, Proc. CARDIS 2010. LNCS, vol. 6035, pp. 223–237. Springer, Heidelberg (2010) [CPS10] Chen, L., Page, D., Smart, N.P.: On the design and implementation of an efficient DAA scheme. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) Smart Card Research and Advanced Applications, Proc. CARDIS 2010. LNCS, vol. 6035, pp. 223–237. Springer, Heidelberg (2010)
[CW10]
Zurück zum Zitat [CW10] Chen, L., Warinschi, B.: Security of the TCG privacy-CA solution. In: Proceedings of the 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010) [CW10] Chen, L., Warinschi, B.: Security of the TCG privacy-CA solution. In: Proceedings of the 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010)
[GT07]
Zurück zum Zitat [GT07] Ge, H., Tate, S.R.: A direct anonymous attestation scheme for embedded devices. In: Okamoto, T., Wang, X. (eds.) Public Key Cryptography PKC 2007. LNCS, vol. 4450, pp. 16–30. Springer, Heidelberg (2007) [GT07] Ge, H., Tate, S.R.: A direct anonymous attestation scheme for embedded devices. In: Okamoto, T., Wang, X. (eds.) Public Key Cryptography PKC 2007. LNCS, vol. 4450, pp. 16–30. Springer, Heidelberg (2007)
[ISO11889]
Zurück zum Zitat [ISO11889] ISO/IEC 11889:2009 Information technology – Security techniques – Trusted platform module [ISO11889] ISO/IEC 11889:2009 Information technology – Security techniques – Trusted platform module
[ISO20008]
Zurück zum Zitat [ISO20008] ISO/IEC 20008 DIS Information technology – Security techniques – Anonymous digital signatures [ISO20008] ISO/IEC 20008 DIS Information technology – Security techniques – Anonymous digital signatures
[LCM08]
Zurück zum Zitat [LCM08] Leung, A., Chen, L., Mitchell, C.J.: On a possible privacy flaw in direct anonymous attestation (DAA). In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trusted Computing - Challenges and Applications, Proc. of TRUST2008. LNCS, vol. 4968, pp. 179–190. Springer, Heidelberg (2008) [LCM08] Leung, A., Chen, L., Mitchell, C.J.: On a possible privacy flaw in direct anonymous attestation (DAA). In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trusted Computing - Challenges and Applications, Proc. of TRUST2008. LNCS, vol. 4968, pp. 179–190. Springer, Heidelberg (2008)
[LM07]
Zurück zum Zitat [LM07] Leung, A., Mitchell, C.J.: Ninja: Non identity based, privacy preserving authentication for ubiquitous environments. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiquitousComputing UbiComp 2007. LNCS, vol. 4717, pp. 73–90. Springer, Heidelberg (2007) [LM07] Leung, A., Mitchell, C.J.: Ninja: Non identity based, privacy preserving authentication for ubiquitous environments. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiquitousComputing UbiComp 2007. LNCS, vol. 4717, pp. 73–90. Springer, Heidelberg (2007)
[LRSW00]
Zurück zum Zitat [LRSW00] Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems (extended abstract). In: Heys, H.M., Adams, C.M. (eds.) Selected Areas in Cryptography SAC 1999. LNCS, vol. 1758, pp. 184–199. Springer, Heidelberg (2000) [LRSW00] Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems (extended abstract). In: Heys, H.M., Adams, C.M. (eds.) Selected Areas in Cryptography SAC 1999. LNCS, vol. 1758, pp. 184–199. Springer, Heidelberg (2000)
[PM05]
Zurück zum Zitat [PM05] Pashalidis, A., Mitchell, C.J.: Single sign-on using TCG-conformant platforms. In: Mitchell, C. (ed.) Trusted Computing, pp. 175–193. IEEE, London (2005) [PM05] Pashalidis, A., Mitchell, C.J.: Single sign-on using TCG-conformant platforms. In: Mitchell, C. (ed.) Trusted Computing, pp. 175–193. IEEE, London (2005)
[Ru07]
Zurück zum Zitat [Ru07] Rudolph, C.: Covert identity information in direct anonymous attestation (DAA). In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments, Proc. SEC 2007. IFIP, vol. 232, pp. 443–448. Springer, Boston (2007) [Ru07] Rudolph, C.: Covert identity information in direct anonymous attestation (DAA). In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments, Proc. SEC 2007. IFIP, vol. 232, pp. 443–448. Springer, Boston (2007)
[Sch90]
Zurück zum Zitat [Sch90] Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) Advances in Cryptography CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, Heidelberg (1990) [Sch90] Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) Advances in Cryptography CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, Heidelberg (1990)
[SRC07]
Zurück zum Zitat [SRC07] Smyth, B., Ryan, M., Chen, L.: Direct anonymous attestation (DAA): ensuring privacy with corrupt administrators. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) Security and Privacy in ad-hoc and Sensor Networks, Proc. ESAS 2007. LNCS, vol. 4572, pp. 218–231. Springer, Heidelberg (2007) [SRC07] Smyth, B., Ryan, M., Chen, L.: Direct anonymous attestation (DAA): ensuring privacy with corrupt administrators. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) Security and Privacy in ad-hoc and Sensor Networks, Proc. ESAS 2007. LNCS, vol. 4572, pp. 218–231. Springer, Heidelberg (2007)
[SRC11]
Zurück zum Zitat [SRC11] Smyth B., Ryan M., Chen, L.: Formal analysis of anonymity in direct anonymous attestation schemes. In: Barthe, G., Datta, A., Etalk, S. (eds.) Proceedings of the 8th International Workshop on Formal Aspects of Security & Trust (FAST 2011) LNCS, vol.7140, pp. 245–262, 2011. Springer, Heidelberg (2011) [SRC11] Smyth B., Ryan M., Chen, L.: Formal analysis of anonymity in direct anonymous attestation schemes. In: Barthe, G., Datta, A., Etalk, S. (eds.) Proceedings of the 8th International Workshop on Formal Aspects of Security & Trust (FAST 2011) LNCS, vol.7140, pp. 245–262, 2011. Springer, Heidelberg (2011)
Metadaten
Titel
Direct Anonymous Attestation (DAA) in More Depth
verfasst von
Graeme Proudler
Liqun Chen
Chris Dalton
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-08744-3_12