Pairings in Trusted Computing
نویسندگان
چکیده
Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly simplified or expanded using the mathematical structures of different types of pairings. In this paper we consider another advanced application of pairings, namely to the Direct Anonymous Attestation (DAA) schemes as found in the Trusted Computing Group standards. We show that a recent DAA proposal can be further optimized by transferring the underlying pairing groups from the symmetric to the asymmetric settings. This provides a more efficient and scalable solution than the existing RSA and pairing based DAA schemes. External Posting Date: June 21, 2008 [Fulltext] Approved for External Publication Internal Posting Date: June 21, 2008 [Fulltext] To be published in The Second International Conference on Pairing Cryptography Proceedings, Sept 1-3, 2008 © Copyright 2008 The Second International Conference on Pairing Cryptography Proceedings Pairings in Trusted Computing L. Chen, P. Morrissey and N.P. Smart 1 Hewlett-Packard Laboratories, Filton Road, Stoke Gifford, Bristol, BS34 8QZ, United Kingdom. [email protected] 2 Computer Science Department, Woodland Road, University of Bristol, Bristol, BS8 1UB, United Kingdom. {paulm, nigel}@cs.bris.ac.uk Abstract. Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applicaPairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly simplified or expanded using the mathematical structures of different types of pairings. In this paper we consider another advanced application of pairings, namely to the Direct Anonymous Attestation (DAA) schemes as found in the Trusted Computing Group standards. We show that a recent DAA proposal can be further optimized by transferring the underlying pairing groups from the symmetric to the asymmetric settings. This provides a more efficient and scalable solution than the existing RSA and pairing based DAA schemes.
منابع مشابه
Design and Implementation of Remote Anonymous Attestation Protocol Based on Trusted Cloud Computing Platform
Trusted cloud computing platform is a combination of the use of virtual machine technology and trusted computing technology of cloud computing platform. Virtual machine technology because of its high separability of the client and the resource of high controllability, which greatly improves the security of the system; and the trusted computing technology is through the establishment of a truste...
متن کاملBatch Pairing Delegation
Abstract. Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as when the computing devices are resource-constrained. Pairing delegation introduced in [19] provides a solution by offloading the computation to more powerful entities. In this paper, we introduce the concept of, and con...
متن کاملBilinear Pairings-Based Threshold Identity Authentication Scheme For Ad Hoc Network
Aiming at specific security threats in ad hoc network, this paper presents a bilinear pairings-based threshold identity authentication scheme without the trusted center. In this work, the security of certificate has been significantly enhanced by using improved GDH signature and interactive secret-sharing, that is, any attacker cannot forge a valid certificate for the untrusted nodes. The propo...
متن کاملNew ID-Based Threshold Signature Scheme from Bilinear Pairings
ID-based public key systems allow the user to use his/her identity as the public key, which can simplify key management procedure compared with CA-based public key systems. However, there is an inherent disadvantage in such systems: the problem of private key escrow, i.e., the “trusted” Private Key Generator (PKG) can easily impersonate any user at any time without being detected. Although the ...
متن کاملMultiple Trusted Authorities in Identifier Based Cryptography from Pairings on Elliptic Curves
identifier based cryptography, multiple trusted authority, pairings We investigate a number of issues related to a key generation service in identifier based cryptographic technology. In particular, we focus on how to make this service more trustworthy. Our solution is the use of multiple trusted authorities in identifier based cryptography (MTAIBC), where these trusted authorities work togethe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008