D. Bernhard
Anonymous attestation with user-controlled linkability
Bernhard, D.; Fuchsbauer, G.; Ghadafi, E.; Smart, N. P.; Warinschi, B.
Authors
G. Fuchsbauer
Essam Ghadafi Essam.Ghadafi@uwe.ac.uk
Senior Lecturer in Computer Science
N. P. Smart
B. Warinschi
Abstract
This paper is motivated by the observation that existing security models for direct anonymous attestation (DAA) have problems to the extent that insecure protocols may be deemed secure when analysed under these models. This is particularly disturbing as DAA is one of the few complex cryptographic protocols resulting from recent theoretical advances actually deployed in real life. Moreover, standardization bodies are currently looking into designing the next generation of such protocols. Our first contribution is to identify issues in existing models for DAA and explain how these errors allow for proving security of insecure protocols. These issues are exhibited in all deployed and proposed DAA protocols (although they can often be easily fixed). Our second contribution is a new security model for a class of "pre-DAA scheme", that is, DAA schemes where the computation on the user side takes place entirely on the trusted platform. Our model captures more accurately than any previous model the security properties demanded from DAA by the trusted computing group (TCG), the group that maintains the DAA standard. Extending the model from pre-DAA to full DAA is only a matter of refining the trust models on the parties involved. Finally, we present a generic construction of a DAA protocol from new building blocks tailored for anonymous attestation. Some of them are new variations on established ideas and may be of independent interest. We give instantiations for these building blocks that yield a DAA scheme more efficient than the one currently deployed, and as efficient as the one about to be standardized by the TCG which has no valid security proof. © 2013 Springer-Verlag Berlin Heidelberg.
Journal Article Type | Article |
---|---|
Acceptance Date | Feb 23, 2013 |
Publication Date | Jun 1, 2013 |
Publicly Available Date | Jun 7, 2019 |
Journal | International Journal of Information Security |
Print ISSN | 2356-5845 |
Electronic ISSN | 2382-2619 |
Publisher | N&N Global Technology |
Peer Reviewed | Peer Reviewed |
Volume | 12 |
Issue | 3 |
Pages | 219-249 |
DOI | https://doi.org/10.1007/s10207-013-0191-z |
Keywords | DAA protocol, group signatures, security models |
Public URL | https://uwe-repository.worktribe.com/output/934678 |
Publisher URL | http://dx.doi.org/10.1007/s10207-013-0191-z |
Additional Information | Additional Information : The final publication is available at Springer via http://dx.doi.org/10.1007/s10207-013-0191-z |
Files
658.pdf
(395 Kb)
PDF
You might also like
Efficient round-optimal blind signatures in the standard model
(2017)
Book Chapter
Foundations of fully dynamic group signatures
(2020)
Journal Article
Short accountable ring signatures based on DDH
(2016)
Presentation / Conference Contribution
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search