The DAA scheme in context
- 1 January 2005
- book chapter
- Published by Institution of Engineering and Technology (IET)
- p. 143-174
- https://doi.org/10.1049/pbpc006e_ch5
Abstract
This chapter describes the Direct Anonymous Attestation (DAA) scheme in the con text of its development and use within the TCG specification. This scheme was originated by Brickell, Camemsch and Chen. It was adopted by the Trusted Computing Group as the method for remote anonymous authen tication of a Trusted Platform Module (TPM). In this chapter, we first talk about how the work of designing DAA started from a conflict between the need for security and the need for privacy in TPM authentication. In the historical context, we acknowledge various schemes which have been developed in response to this TCG problem, and which eventually led to the DAA scheme. In the context of a solution to the problem. we focus on explaining how the DAA scheme proposed by Brickell, Camemsch and Chen works. In the context of further consideration, we discuss some options for the reissue of DAA keys and some possible improvements to increase the performance of the DAA.Keywords
This publication has 0 references indexed in Scilit: