搜索结果: 1-15 共查到“密码学 attestation”相关记录26条 . 查询时间(0.054 秒)
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware
FPGA configurable hardware remote attestation
font style='font-size:12px;'>
2019/4/23
Field-Programmable Gate Arrays or FPGAs are popular platforms for hardware-based attestation. They offer protection against physical and remote attacks by verifying if an embedded processor is running...
Anonymous Attestation for IoT
Enhanced Privacy ID EPID Authentication
font style='font-size:12px;'>
2019/2/27
Internet of Things (IoT) have seen tremendous growth and are being deployed pervasively in areas such as home, surveillance, health-care and transportation. These devices collect and process sensitive...
Direct Anonymous Attestation with Optimal TPM Signing Efficiency
Direct anonymous attestation TPM 2.0 implementation Anonymous signatures
font style='font-size:12px;'>
2018/11/29
Direct Anonymous Attestation (DAA) is an anonymous signature scheme, which is designed to allow the Trusted Platform Module (TPM), a small chip embedded in a host computer, to attest to the state of t...
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification
SGX TOFU
font style='font-size:12px;'>
2018/11/9
Intel's Software Guard Extensions (SGX) enables isolated execution environments, called enclaves, on untrusted operating systems (OS), and thus it can improve the security for various applications and...
On The Use of Remote Attestation to Break and Repair Deniability
deniable protocols OTR
font style='font-size:12px;'>
2018/5/11
Deniable messaging protocols allow two parties to have `off-the-record' conversations without leaving any record that can convince external verifiers about what either of them said during the conversa...
Secure Boot and Remote Attestation in the Sanctum Processor
secure boot remote attestation Physical Unclonable Function
font style='font-size:12px;'>
2018/5/11
During the secure boot process for a trusted execution environment, the processor must provide a chain of certificates to the remote client demonstrating that their secure container was established as...
L-DAA: Lattice-Based Direct Anonymous Attestation
Lattice based cryptography Direct Anonymous Attestation Universally Composable security model
font style='font-size:12px;'>
2018/5/3
Direct Anonymous Attestation (DAA) is an anonymous digi- tal signature that aims to provide both signer authentication and privacy. DAA was designed for the attestation service of the Trusted Platform...
Secure Remote Attestation
checksum process Secure Remote Attestation
font style='font-size:12px;'>
2018/1/11
More than ten years ago, a devastating data substitution attack was shown to successfully compromise all previously proposed remote attestation techniques. In fact, the authors went further than simpl...
Probabilistic and Considerate Attestation of IoT Devices against Roving Malware
SMARM RA
font style='font-size:12px;'>
2017/12/19
Remote Attestation (RA) is a popular means of detecting malware presence (or verifying its absence) on embedded and IoT devices. It is especially relevant to low-end devices that are incapable of prot...
Direct Anonymous Attestation from Lattices
Lattice-based Cryptography Anonymous Signatures DAA
font style='font-size:12px;'>
2017/10/25
Direct Anonymous Attestation (DAA) is a complex cryptographic protocol that has been widely deployed in practice, with more than 500 million machines in the market that are already equipped with its h...
SGX Remote Attestation is not Sufficient
SGX SGX simulator
font style='font-size:12px;'>
2017/8/2
Intel SGX enclaves provide hardware enforced confidentiality and integrity guarantees for running pure computations (\ie, OS-level side-effect-free code) in the cloud environment. In addition, SGX rem...
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation
Direct Anonymous Attestation Anonymity Privacy Standards
font style='font-size:12px;'>
2017/7/4
The Trusted Platform Module (TPM) is an international standard for a security chip that can be used for the management of cryptographic keys and for remote attestation. The specification of the most r...
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors
remote attestation implementation embedded devices
font style='font-size:12px;'>
2017/6/22
A major challenge in computer security is about establishing the trustworthiness of remote platforms. Remote attestation is the most common approach to this challenge. It allows a remote platform to m...
Anonymous Attestation with Subverted TPMs
Direct Anonymous Attestation Subliminal channel Anonymity, Privacy
font style='font-size:12px;'>
2017/3/6
Various sources have revealed that cryptographic standards and components have been subverted to undermine the security of users, reigniting research on means to achieve security in presence of such s...
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
Direct Anonymous Attestation Universal Composability Trusted Platform Module
font style='font-size:12px;'>
2016/6/29
Direct Anonymous Attestation (DAA) is a cryptographic protocol for privacy-protecting authentication. It is standardized in the TPM standard and implemented in millions of chips. A variant of DAA is a...