Direct Anonymous Attestation
Direct Anonymous Attestation (DAA) is a cryptographic primitive which enables remote authentication of a trusted computer whilst preserving privacy of the platform's user. The protocol has been adopted by the Trusted Computing Group (TCG) in the latest version of its Trusted Platform Module (TPM) specification[1] to address privacy concerns (see also Loss of Internet anonymity).
Historical perspective
In principle the privacy issue could be resolved using any standard signature scheme (or public key encryption) and a single key pair. Manufacturers would embed the private key into every TPM produced and the public key would be published as a certificate. Signatures produced by the TPM must have originated from the private key, by the nature of the technology, and since all TPMs use the same private key they are indistinguishable ensuring the user's privacy. This rather naive solution relies upon the assumption that there exists a global secret. One only needs to look at the precedent of Content Scramble System (CSS), an encryption system for DVDs, to see that this assumption is fundamentally flawed. Furthermore this approach fails to realize a secondary goal: the ability to detect rogue TPMs. A rogue TPM is a TPM that has been compromised and had its secrets extracted.
The solution first adopted by the TCG (TPM specification v1.1) required a trusted third-party, namely a privacy certificate authority (privacy CA). Each TPM has an embedded RSA key pair called an Endorsement Key (EK) which the privacy CA is assumed to know. In order to attest the TPM generates a second RSA key pair called an Attestation Identity Key (AIK). It sends the public AIK, signed by EK, to the privacy CA who checks its validity and issues a certificate for the AIK. (For this to work, either a) the privacy CA must know the TPM's public EK a priori, or b) the TPM's manufacturer must have provided an endorsement certificate.) The host/TPM is now able to authenticate itself with respect to the certificate. This approach permits two possibilities to detecting rogue TPMs: firstly the privacy CA should maintain a list of TPMs identified by their EK known to be rogue and reject requests from them, secondly if a privacy CA receives too many requests from a particular TPM it may reject them and blacklist the TPMs EK. The number of permitted requests should be subject to a risk management exercise. This solution is problematic since the privacy CA must take part in every transaction and thus must provide high availability whilst remaining secure. Furthermore privacy requirements may be violated if the privacy CA and verifier collude. Although the latter issue can probably be resolved using blind signatures, the first remains.
Overview
The DAA protocol is based on three entities and two different steps. The entities are the TPM platform, the DAA Issuer and the DAA verifier. The issuer is charged to verify the TPM platform during the Join step and to issue DAA credential to the platform. The platform uses the DAA credential with the verifier during the Sign step. Through a zero-knowledge proof the verifier can verify the credential without attempting to violate the platform's privacy. The protocol also supports a blacklisting capability so that verifiers can identify attestations from TPMs that have been compromised.
Privacy properties
The protocol allows differing degrees of privacy. Interactions are always anonymous, but the user/verifier may negotiate as to whether the verifier is able to link transactions. This would allow user profiling and/or the rejection of requests originating from a host which has made too many requests.
Implementations
The first Direct Anonymous Attestation scheme is due to Brickell, Camenisch, and Chen;[2] that scheme is insecure and requires a fix.[3] Brickell, Chen, and Li improve efficiency of that first scheme using symmetric pairings, rather than RSA.[4] And Chen, Morrissey, and Smart attempt to further improve efficiency by switching from a symmetric to an asymmetric setting;[5][6] unfortunately, the asymmetric scheme is insecure.[7] Chen, Page, and Smart propose a new asymmetric scheme.[8]
See also
References
- ↑ TPM Specification
- ↑ Brickell; Camenisch; Chen (2004). "Direct Anonymous Attestation" (PDF). ACM Conference on Computer and Communications Security: 132–145.
- ↑ Smyth; Ryan; Chen (2015). "Formal analysis of privacy in Direct Anonymous Attestation schemes" (PDF). Science of Computer Programming 111 (2).
- ↑ Brickell; Chen; Li (2009). "Simplified security notions of Direct Anonymous Attestation and a concrete scheme from pairings" (PDF). International Journal of Information Security 8 (5): 315–330.
- ↑ Chen; Morrissey; Smart (2008). "On Proofs of Security for DAA Schemes". 3rd International Conference on Trust and Trustworthy Computing 5324: 156–175.
- ↑ Chen; Morrissey; Smart (2008). "Pairings in Trusted Computing". 2nd International Conference on Pairing-Based Cryptography 5209: 1–17.
- ↑ Chen; Li (2010). "A note on the Chen-Morrissey-Smart DAA scheme". Information Processing Letters 110 (12-13): 485–488.
- ↑ Chen; Page; Smart (2010). "On the Design and Implementation of an Efficient DAA Scheme" (PDF). 8th International Conference on Smart Card Research and Advanced Applications 6035: 223–237.
External links
- E. Brickell, J. Camenisch, and L. Chen: Direct anonymous attestation. In Proceedings of 11th ACM Conference on Computer and Communications Security, ACM Press, 2004. (PDF)
- E. Brickell, J. Camenisch, and L. Chen: Direct anonymous attestation . ()
- Interdomain User Authentication and Privacy by Andreas Pashalidis - section 6 provides a useful introduction to DAA Dead Link
- IBM idemix (identity mixer) an 'anonymous credential system' under development by IBM
- Heiko Stamer - Implementing Direct Anonymous Attestation for the TPM Emulator Project Dead Link