Direct Anonymous Attestation (DAA) is an anonymous signature scheme designed for anonymous attestation of a Trusted Platform Module (TPM) while preserving the privacy of the device owner. Since TPM has limited bandwidth and computational capability, one interesting feature of DAA is to split the signer role between two entities: a TPM and a host platform where the TPM is attached. Recently, Chen proposed a new DAA scheme that is more efficient than previous DAA schemes. In this paper, we construct a new DAA scheme requiring even fewer TPM resources. Our DAA scheme is about 5 times more efficient than Chen’s scheme for the TPM implementation using the Barreto-Naehrig curves. In addition, our scheme requires much smaller size of software code...
Abstract. In this report we present an efficient anonymous authentication scheme that works in a man...
Direct Anonymous Attestation (DAA) was designed for the Trusted Platform Module (TPM) and versions u...
AbstractThe remote anonymous trusted authentication of M2M equipments is a key problem in Internet o...
Abstract—Trusted computing platforms have been proposed as a promising approach to enhance the secur...
direct anonymous attestation, DAA, trusted computing, group signatures This paper describes the dire...
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the T...
Direct Anonymous Attestation (Daa) is a set of cryptographic schemes used to create anonymous digita...
Direct Anonymous Attestation (Daa) is a set of cryptographic schemes used to create anonymous digita...
Direct Anonymous Attestation (DAA) is one of the most complex cryptographic protocols deployed in pr...
Direct Anonymous Attestation (DAA) is one of the most complex cryptographic protocols deployed in pr...
Direct Anonymous Attestation (DAA) is one of the most complex cryptographic protocols deployed in pr...
Direct Anonymous Attestation (DAA) is one of the most complex cryptographic protocols deployed in pr...
Abstract. In TPM2.0, a single signature primitive is proposed to sup-port various signature schemes ...
Abstract. Direct anonymous attestation (DAA) is an anonymous au-thentication scheme adopted by the T...
We propose an efficient anonymous authentication scheme which might be deployed in the setting of tr...
Abstract. In this report we present an efficient anonymous authentication scheme that works in a man...
Direct Anonymous Attestation (DAA) was designed for the Trusted Platform Module (TPM) and versions u...
AbstractThe remote anonymous trusted authentication of M2M equipments is a key problem in Internet o...
Abstract—Trusted computing platforms have been proposed as a promising approach to enhance the secur...
direct anonymous attestation, DAA, trusted computing, group signatures This paper describes the dire...
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the T...
Direct Anonymous Attestation (Daa) is a set of cryptographic schemes used to create anonymous digita...
Direct Anonymous Attestation (Daa) is a set of cryptographic schemes used to create anonymous digita...
Direct Anonymous Attestation (DAA) is one of the most complex cryptographic protocols deployed in pr...
Direct Anonymous Attestation (DAA) is one of the most complex cryptographic protocols deployed in pr...
Direct Anonymous Attestation (DAA) is one of the most complex cryptographic protocols deployed in pr...
Direct Anonymous Attestation (DAA) is one of the most complex cryptographic protocols deployed in pr...
Abstract. In TPM2.0, a single signature primitive is proposed to sup-port various signature schemes ...
Abstract. Direct anonymous attestation (DAA) is an anonymous au-thentication scheme adopted by the T...
We propose an efficient anonymous authentication scheme which might be deployed in the setting of tr...
Abstract. In this report we present an efficient anonymous authentication scheme that works in a man...
Direct Anonymous Attestation (DAA) was designed for the Trusted Platform Module (TPM) and versions u...
AbstractThe remote anonymous trusted authentication of M2M equipments is a key problem in Internet o...