Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes

作者: Ben Smyth , Mark Ryan , Liqun Chen

DOI: 10.1007/978-3-642-29420-4_16

关键词:

摘要: A definition of user-controlled anonymity is introduced for Direct Anonymous Attestation schemes. The expressed as an equivalence property suited to automated reasoning using ProVerif and the practicality demonstrated by examining ECCbased protocol Brickell, Chen & Li.We show that this scheme satisfies our under assumption adversary obtains no advantage from re-blinding a blind signature.

参考文章(25)
Liqun Chen, Paul Morrissey, Nigel P. Smart, On Proofs of Security for DAA Schemes provable security. pp. 156- 175 ,(2008) , 10.1007/978-3-540-88733-1_11
Ernie Brickell, Liqun Chen, Jiangtao Li, A New Direct Anonymous Attestation Scheme from Bilinear Maps trust and trustworthy computing. pp. 166- 178 ,(2008) , 10.1007/978-3-540-68979-9_13
Jan Camenisch, Markus Stadler, Efficient Group Signature Schemes for Large Groups (Extended Abstract) international cryptology conference. pp. 410- 424 ,(1997) , 10.1007/BFB0052252
Ben Smyth, Mark Ryan, Liqun Chen, Direct anonymous attestation (DAA): ensuring privacy with corrupt administrators security of ad hoc and sensor networks. ,vol. 4572, pp. 218- 231 ,(2007) , 10.1007/978-3-540-73275-4_16
Jan Camenisch, Anna Lysyanskaya, Signature Schemes and Anonymous Credentials from Bilinear Maps Advances in Cryptology – CRYPTO 2004. pp. 56- 72 ,(2004) , 10.1007/978-3-540-28628-8_4
Martín Abadi, Cédric Fournet, Mobile values, new names, and secure communication Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '01. ,vol. 36, pp. 104- 115 ,(2001) , 10.1145/360204.360213
Jan Camenisch, Ernie Brickell, Ernie Brickell, Liqun Chen, Direct anonymous attestation computer and communications security. pp. 132- 145 ,(2004) , 10.1145/1030083.1030103
Bruno Blanchet, Martín Abadi, Cédric Fournet, Automated verification of selected equivalences for security protocols The Journal of Logic and Algebraic Programming. ,vol. 75, pp. 3- 51 ,(2008) , 10.1016/J.JLAP.2007.06.002