TATA: Towards Anonymous Trusted Authentication

نویسندگان

  • Daniele Quercia
  • Stephen Hailes
  • Licia Capra
چکیده

Mobile devices may share resources even in the presence of untrustworthy devices. To do so, each device may use a computational model that on input of reputation information produces trust assessments. Based on such assessments, the device then decides with whom to share: it will likely end up sharing only with the most trustworthy devices, thus isolating the untrustworthy ones. All of this is, however, theoretical in the absence of a general and distributed authentication mechanism. Currently, distributed trust frameworks do not offer an authentication mechanism that supports user privacy, whilst being resistant to “Sybil attacks”. To fill the gap, we first analyze the general attack space that relates to anonymous authentication as it applies to distributed trust models. We then put forward a scheme that is based on blinded threshold signature: collections of devices certify pseudonyms without seeing them and without relying on a central authority. We finally discuss how the scheme tackles the authentication

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Anonymous Authentication Scheme for Trusted Computing Platform

The Trusted Computing Platform is the industrial initiative to implement computer security. However, privacy protection is a critical problem that must be solved in Trusted Computing Platform. In this paper, we propose a simple and efficient method to implement anonymous authentication in such setting. The new scheme is proved to be secure under the strong RSA assumption and decisional Diffie-H...

متن کامل

A Direct Anonymous Attestation Scheme for Embedded Devices

Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. This paper presents an efficient construction that implements all anonymous authentication features specified in DAA, including authentication with total anonymity, authentication with variable anonymity, and rogue TPM tagging. Th...

متن کامل

A Method to Implement Direct Anonymous Attestation

In this report we present an efficient anonymous authentication scheme that works in a manner similarly to the so-called Direct Anonymous Attestation in the setting of the Trusted Computing Platform. Our construction implements features such as total anonymity, variable anonymity, and rogue TPM tagging. The new scheme is significantly simpler, and more efficient than the current solution that h...

متن کامل

Thesis Proposal: Spontaneous Anonymous Group Cryptography and its Applications

Spontaneous Anonymous Group (SAG) Cryptography studies cryptographic problems in which an entity specifies a group of entites including itself arbitrarily and spontaneously while maintaining its anonymity. There is no Trusted Third Party (TTP) or group manager to get involved. Also, no membership collaboration or any preprocessing is needed.These properties are desirable for many applications r...

متن کامل

Direct Anonymous Attestation for Next Generation TPM

Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme that allows a Trusted Platform Module (TPM) which is the core component of the trusted computing platform to remotely convince a communication partner that it is indeed a Trusted Platform Module while preserving the us...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006