2016
DOI: 10.1007/978-3-319-49100-4_6
|View full text |Cite
|
Sign up to set email alerts
|

Algorithm Agility – Discussion on TPM 2.0 ECC Functionalities

Abstract: Abstract. The TPM 2.0 specification has been designed to support a number of Elliptic Curve Cryptographic (ECC) primitives, such as key exchange, digital signatures and Direct Anonymous Attestation (DAA). In order to meet the requirement that di↵erent TPM users may favor di↵erent cryptographic algorithms, each primitive can be implemented from multiple algorithms. This feature is called Algorithm Agility. For the purpose of performance e ciency, multiple algorithms share a small set of TPM commands. In this pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
0
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 18 publications
0
0
0
Order By: Relevance
“…With the TPM 2.0 specification, TPMs started being usable also for a wider range of applications. Chen and Urian [CU16] have summarized the interface provided by the TPM 2.0 specification that can be used for implementing advanced protocols with keys stored securely inside TPMs. These building blocks can be used to construct protocols that perform operations with the secret key securely within the TPM but rely on the host for privacy and other protocol properties.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…With the TPM 2.0 specification, TPMs started being usable also for a wider range of applications. Chen and Urian [CU16] have summarized the interface provided by the TPM 2.0 specification that can be used for implementing advanced protocols with keys stored securely inside TPMs. These building blocks can be used to construct protocols that perform operations with the secret key securely within the TPM but rely on the host for privacy and other protocol properties.…”
Section: Related Workmentioning
confidence: 99%
“…A number of remote attestation protocols with better privacy properties have been proposed [CL13,PZ11,CU15]. Chen and Urian [CU16] have also shown how four ECC-based asymmetric decryption algorithms can be implemented with TPMs: ECIES, PSEC, ACE, and FACE. Multi-party signature protocols have been implemented on TPMs for BLS signatures [HA20] and even for a restricted variant of Schnorr signatures [Jan23].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations