
doi: 10.1049/pbpc006e_ch5
This chapter describes the Direct Anonymous Attestation (DAA) scheme in the con text of its development and use within the TCG specification. This scheme was originated by Brickell, Camemsch and Chen. It was adopted by the Trusted Computing Group as the method for remote anonymous authen tication of a Trusted Platform Module (TPM). In this chapter, we first talk about how the work of designing DAA started from a conflict between the need for security and the need for privacy in TPM authentication. In the historical context, we acknowledge various schemes which have been developed in response to this TCG problem, and which eventually led to the DAA scheme. In the context of a solution to the problem. we focus on explaining how the DAA scheme proposed by Brickell, Camemsch and Chen works. In the context of further consideration, we discuss some options for the reissue of DAA keys and some possible improvements to increase the performance of the DAA.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 16 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
