2009
DOI: 10.1007/978-3-642-00587-9_7
|View full text |Cite
|
Sign up to set email alerts
|

A PrivacyCA for Anonymity and Trust

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
6
3
1

Relationship

5
5

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…The single attestation identity key K AIK serves for platform attestation and certification of other TPM keys. In our concept, the TrustCenter also takes the additional role of a PrivacyCA [32]. As part of AIK creation, it issues an AIK certificate for K AIK pub : A copy of this AIK certificate Cert AIK is stored on the camera.…”
Section: System Architecture and Setupmentioning
confidence: 99%
“…The single attestation identity key K AIK serves for platform attestation and certification of other TPM keys. In our concept, the TrustCenter also takes the additional role of a PrivacyCA [32]. As part of AIK creation, it issues an AIK certificate for K AIK pub : A copy of this AIK certificate Cert AIK is stored on the camera.…”
Section: System Architecture and Setupmentioning
confidence: 99%
“…Such an Attestation Identity Key (AIK) can be created on demand within the TPM. Its authenticity can then be certified by an online trusted third party, called PrivacyCA, demonstrated in [31] or by the more complex group-signature based DAA scheme [3]. An AIK can be used one or several times, whenever an attester requests the attestation of the trusted platform.…”
Section: Platform Support For Remote Attestationmentioning
confidence: 99%
“…To protect the platform owner's privacy, a pseudonym identity is used: an Attestation Identity Key (AIK). The authenticity of an AIK can be certified by an online trusted third party, called PrivacyCA [10], or with the group-signature-based DAA scheme. Then, a remote verifier may analyze the Quote result and decide whether to trust the given configuration or not.…”
Section: Trusted Computing In Nfc Environmentsmentioning
confidence: 99%