Search
Search Results
-
Hash-Based Direct Anonymous Attestation
Direct Anonymous Attestation (DAA) was designed for the Trusted Platform Module (TPM) and versions using RSA and elliptic curve cryptography have... -
-
Towards a Privacy-Preserving Attestation for Virtualized Networks
TPM remote attestation allows to verify the integrity of the boot sequence of a remote device. Deep Attestation extends that concept to virtualized... -
Improving the security of direct anonymous attestation under host corruptions
Direct anonymous attestation (DAA) enables a platform including a trusted platform module (TPM) to produce a signature in order to remotely attest...
-
-
Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass
The secure deployment of NFC-enabled digital services, such as electronic payment, electronic identification (eID), and mobile transit passes in... -
SoK: Anonymous Credentials
Anonymous credentials are a powerful tool for making assertions about identity while maintaining privacy and have been the subject of study for many... -
To Attest or Not to Attest, This is the Question – Provable Attestation in FIDO2
FIDO2 is currently the main initiative for passwordless authentication in web servers. It mandates the use of secure hardware authenticators to... -
Towards an attestation architecture for blockchain networks
If blockchain networks are to become the building blocks of the infrastructure for the future digital economy, then several challenges related to the...
-
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking
Deep attestation is a particular case of remote attestation, i.e., verifying the integrity of a platform with a remote verification server. We focus... -
Remote Attestation in IoT Devices
Abstract -
ACDC: Anonymous Crowdsourcing Using Digital Cash
Crowdsourcing applications are vulnerable to Sybil attacks where attackers create many accounts to submit bogus or malicious data at scale. The... -
Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use
User attributes can be authenticated by an attribute-based anonymous credential while kee** the anonymity of the user. Most attribute-based... -
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols
A key component in building trusted computing services is a highly secure anchor that serves as a Root-of-Trust (RoT). There are several works that... -
Anonymous Trusted Data Relocation for TEEs
Trusted Execution Environment (TEE) technology like ARM TrustZone allows protecting confidential data using cryptographic keys that are bound to a... -
Subversion-Resilient Enhanced Privacy ID
Anonymous attestation for secure hardware platforms leverages tailored group signature schemes and assumes the hardware to be trusted. Yet, there is... -
Electronic Cash with Open-Source Observers
Electronic cash (e-cash) systems need to satisfy the property of anonymity, unforgeability, and transparency which prevent criminal activities from... -
An efficient post-quantum secure dynamic EPID signature scheme using lattices
Enhanced Privacy ID (EPID) signatures can be viewed as a direct anonymous attestation mechanism with expanded revocation capabilities. When the...
-
Establishing Secure Communication Channels Using Remote Attestation with TPM 2.0
Remote attestation allows a verifier to remotely check the integrity of a trusted computing platform. In recent years a number of attestation... -
Unlinkable Delegation of WebAuthn Credentials
The W3C’s WebAuthn standard employs digital signatures to offer phishing protection and unlinkability on the web using authenticators which manage...