The Attestation Mechanism in Trusted Computing - PowerPoint PPT Presentation

About This Presentation
Title:

The Attestation Mechanism in Trusted Computing

Description:

Title: The Attestation Mechanism in Trusted Computing Author: Expedia, Inc. Last modified by: Expedia, Inc. Created Date: 3/8/2006 8:29:29 PM Document presentation format – PowerPoint PPT presentation

Number of Views:30
Avg rating:3.0/5.0
Slides: 7
Provided by: Exped1
Category:

less

Transcript and Presenter's Notes

Title: The Attestation Mechanism in Trusted Computing


1
The Attestation Mechanism in Trusted Computing

2
A Simple Remote Attestation Protocol
3
Privacy Concerns
  • The attestation key could be used to track
    internet activity and compromise privacy.
  • 1st solution trusted third party.
  • 2nd solution Direct anonymous attestation. -E.
    Brickell, J. Camenisch, and L. Chen

4
DAA - Joining
Platform
2) DAA, CertCAPKTPM
DAA Issuer
TPM
1) generates DAA key
key(a,b,d,n)
PKTPM SKTPM (Endorsement key)
3) SigIssuer(DAA)
SigIssuer(DAA) is (c,e,s) such that ce adaa bs
d mod n
5
DAA Attestation (1)
1) Generate AIKi
2) Compute A
Platform
3) Compute SigDAAAIKi, verifier, time
4) SigAIKiPKA, A
Application A
Verifier
TPM
PKTPM SKTPM (Endorsement key)
PKAIKi SKAIKi (Attestation Identity Keys)
DAA key
6
DAA Attestation (2)
1) Generate AIKi
2) Compute A
Platform
3) Compute SigDAAAIKi, verifier, time
4) SigAIKiPKA, A
Application A
Verifier
TPM
5) ZKP that establishes that the TPM
posesses SigIssuerDAA and SigDAAAIKi,
verifier, time
PKTPM SKTPM (Endorsement key)
PKAIKi SKAIKi (Attestation Identity Keys)
DAA key
Write a Comment
User Comments (0)
About PowerShow.com