2022
DOI: 10.1007/978-3-031-08147-7_9
|View full text |Cite
|
Sign up to set email alerts
|

HistoTrust: Ethereum-Based Attestation of a Data History Built with OP-TEE and TPM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Compared to a centralized solution based on digital certificates and PKI, the Ethereum-based solution offers a more refined management of security and privacy at the expense of performance. In [2], HistoTrust demonstrates that performance can meet the needs of a real-time usage when using a blockchain.…”
Section: Secure Data History With Trusted Hardwarementioning
confidence: 99%
See 3 more Smart Citations
“…Compared to a centralized solution based on digital certificates and PKI, the Ethereum-based solution offers a more refined management of security and privacy at the expense of performance. In [2], HistoTrust demonstrates that performance can meet the needs of a real-time usage when using a blockchain.…”
Section: Secure Data History With Trusted Hardwarementioning
confidence: 99%
“…In fact, the use of secure hardware components, as TPM and TEE, adds an overhead on the computing time to generate the attestation. The paper [2] presents a detailed study of the performance of HistoTrust according to the security level of the private key sk. On the one hand, on the blockchain side, a huge latency may be observed due to the time interval between two consecutive blocks.…”
Section: Attestation Of the Data Producedmentioning
confidence: 99%
See 2 more Smart Citations
“…Works combining these two technologies are not very abundant, although some cases can be found. This is the case of [42], which introduces a design of an IoT node that incorporates ARM TrustZone for attestation; in addition, attested data are secured storage in a TPM. In the proposal [43], a secure logging system from end-to-end between embedded constraint devices and a remote database is implemented, and the architecture design combines a TEE with a TPM.…”
Section: Related Workmentioning
confidence: 99%