Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities

被引:43
作者
Brickell, Ernie [1 ]
Li, Jiangtao [2 ]
机构
[1] Intel Corp, Intel Architecture Grp, Hillsboro, OR 97124 USA
[2] Intel Corp, Intel Labs, Hillsboro, OR 97124 USA
关键词
Security and protection; anonymity; privacy; cryptographic protocols; trusted computing; SECURITY; SYSTEMS;
D O I
10.1109/TDSC.2011.63
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Direct Anonymous Attestation (DAA) is a scheme that enables the remote authentication of a Trusted Platform Module (TPM) while preserving the user's privacy. A TPM can prove to a remote party that it is a valid TPM without revealing its identity and without linkability. In the DAA scheme, a TPM can be revoked only if the DAA private key in the hardware has been extracted and published widely so that verifiers obtain the corrupted private key. If the unlinkability requirement is relaxed, a TPM suspected of being compromised can be revoked even if the private key is not known. However, with the full unlinkability requirement intact, if a TPM has been compromised but its private key has not been distributed to verifiers, the TPM cannot be revoked. Furthermore, a TPM cannot be revoked from the issuer, if the TPM is found to be compromised after the DAA issuing has occurred. In this paper, we present a new DAA scheme called Enhanced Privacy ID (EPID) scheme that addresses the above limitations. While still providing unlinkability, our scheme provides a method to revoke a TPM even if the TPM private key is unknown. This expanded revocation property makes the scheme useful for other applications such as for driver's license. Our EPID scheme is efficient and provably secure in the same security model as DAA, i.e., in the random oracle model under the strong RSA assumption and the decisional Diffie-Hellman assumption.
引用
收藏
页码:345 / 360
页数:16
相关论文
共 37 条
[1]  
[Anonymous], THESIS WEIZMANN I SC
[2]  
[Anonymous], 2000, Rethinking public key infrastructures and digital certificates: building in privacy
[3]  
[Anonymous], TCG TPM SPEC 1 2
[4]  
[Anonymous], LECT NOTES COMPUTER
[5]  
[Anonymous], P INT WORKSH THEOR A
[6]  
Ateniese G, 2003, LECT NOTES COMPUT SC, V2357, P183
[7]  
Ateniese G, 2000, LECT NOTES COMPUT SC, V1880, P255
[8]  
Bellare M, 1998, LECT NOTES COMPUT SC, V1403, P236, DOI 10.1007/BFb0054130
[9]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[10]  
Boneh D., 2004, CCS 04, P168, DOI DOI 10.1145/1030083.1030106