Authors: Xiaohan Yue; Fucai Zhou; Xibo Wang; Rui Li
Addresses: College of Information Science and Engineering, Shenyang University of Technology, Shenyang, China ' Software College, Northeastern University, Shenyang, China ' College of Information Science and Engineering, Shenyang University of Technology, Shenyang, China ' Liaoning Academy of Safety Science, Shenyang, China
Abstract: Direct anonymous attestation (DAA) is a cryptographic scheme which enables the remote authentication of a trusted platform whilst preserving privacy under the user's control. In this paper, we first present the enhanced security model for DAA, in which more precise security notions demanded from DAA are defined than that in any previous model. Then we propose a novel approach for constructing an efficient DAA scheme: we design a secure two-party computation protocol for the join/issue protocol of DAA, and construct the DAA scheme concretely under the q-SDH assumption, DL assumption and XDH assumption. Based on the enhanced security model, we prove that our DAA scheme meets user-controlled anonymity, user-controlled traceability and non-frameability in the random oracle model. Finally, compared with other existing DAA schemes, our DAA scheme has better performance.
Keywords: trusted computing; direct anonymous attestation; DAA; security models; security proof; non-frameability; two-party computation protocol; cryptography; remote authentication; trusted platforms; preserving privacy preservation; privacy protection; user-controlled anonymity; user-controlled traceability; random oracle model.
International Journal of Internet Protocol Technology, 2017 Vol.10 No.1, pp.36 - 50
Available online: 13 Mar 2017 *Full-text access for editors Access for subscribers Purchase this article Comment on this article