Security of Direct Anonymous Authentication Using TPM 2.0 Signature
From MaRDI portal
Publication:3454571
DOI10.1007/978-3-319-16745-9_3zbMATH Open1400.94189OpenAlexW1929617298MaRDI QIDQ3454571FDOQ3454571
Authors: Tao Zhang, Sherman S. M. Chow
Publication date: 25 November 2015
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16745-9_3
Recommendations
- A TPM-based authenticated key-agreement protocol with one-way anonymous
- Anonymous attestation with subverted TPMs
- A Direct Anonymous Attestation Scheme for Embedded Devices
- P-signatures and Noninteractive Anonymous Credentials
- An enhanced anonymous ECC-based authentication for lightweight application in TMIS
- A traceable and anonymous authentication scheme based on ECC
Cites Work
Cited In (6)
- Improved direct anonymous cross-domain authentication scheme
- An enhanced anonymous ECC-based authentication for lightweight application in TMIS
- A DAA scheme requiring less TPM resources
- Efficient signatures of knowledge and DAA in the standard model
- A note on the Chen-Morrissey-Smart DAA scheme
- A Direct Anonymous Attestation Scheme for Embedded Devices
Uses Software
This page was built for publication: Security of Direct Anonymous Authentication Using TPM 2.0 Signature
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3454571)