Title: The Attestation Mechanism in Trusted Computing
1The Attestation Mechanism in Trusted Computing
2A Simple Remote Attestation Protocol
3Privacy Concerns
- The attestation key could be used to track
internet activity and compromise privacy. - 1st solution trusted third party.
- 2nd solution Direct anonymous attestation. -E.
Brickell, J. Camenisch, and L. Chen
4DAA - Joining
Platform
2) DAA, CertCAPKTPM
DAA Issuer
TPM
1) generates DAA key
key(a,b,d,n)
PKTPM SKTPM (Endorsement key)
3) SigIssuer(DAA)
SigIssuer(DAA) is (c,e,s) such that ce adaa bs
d mod n
5DAA Attestation (1)
1) Generate AIKi
2) Compute A
Platform
3) Compute SigDAAAIKi, verifier, time
4) SigAIKiPKA, A
Application A
Verifier
TPM
PKTPM SKTPM (Endorsement key)
PKAIKi SKAIKi (Attestation Identity Keys)
DAA key
6DAA Attestation (2)
1) Generate AIKi
2) Compute A
Platform
3) Compute SigDAAAIKi, verifier, time
4) SigAIKiPKA, A
Application A
Verifier
TPM
5) ZKP that establishes that the TPM
posesses SigIssuerDAA and SigDAAAIKi,
verifier, time
PKTPM SKTPM (Endorsement key)
PKAIKi SKAIKi (Attestation Identity Keys)
DAA key