Abstract
Anonymity protecting mechanisms are an important part of any Trusted Computing platform. They provide protection of a platform’s anonymity and, consequently, protection of the privacy of the platform’s owners. As Trusted Computing technologies have been introduced on mobile and embedded systems and more and more mobile devices are equipped with Near Field Communication (NFC) modules, the question arises whether the supported anonymization mechanisms can be used efficiently for anonymous authentication for NFC enabled applications. However, state-of-the-art technologies like the Direct Anonymous Attestation scheme require complex mathematical computations that put high requirements on the processing power of the signer’s device which are typically not available on resource constrained devices like smart-cards. In this paper, we analyze how the Direct Anonymous Attestation protocol can be used for anonymous authentication in NFC scenarios and we propose an approach that allows a practical use of this technology in real-world scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ARM Ltd: TrustZone Technology Overview. Introduction, http://www.arm.com/products/esd/trustzone_home.html
Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous credentials on a standard java card. In: Proceedings of the 16th ACM conference on Computer and communications security, CCS 2009, Chicago, Illinois, USA, pp. 600–610. ACM, New York (2009)
Brands, S.A.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge (2000)
Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM conference on Computer and communications security, CCS2004, Washington DC, USA, pp. 132–145. ACM, New York (2004)
Chen, L.: A daa scheme requiring less tpm resources. Cryptology ePrint Archive, Report 2010/008 (2010), http://eprint.iacr.org/
Dietrich, K.: An Integrated Architecture for Trusted Computing for Java Enabled Embedded Devices. In: Proceedings of the 2007 ACM workshop on Scalable trusted computing, STC 2007, pp. 2–6. ACM Press, New York (2007)
Dietrich, K.: Anonymous Credentials for Java Enabled Platforms. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol. 6163, pp. 88–103. Springer, Heidelberg (2010)
Dietrich, K., Winter, J.: Implementation aspects of mobile and embedded trusted computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 29–44. Springer, Heidelberg (2009)
Balasch Masoliver, J.M.: Smart Card Implementation of Anonymous Credentials. Master’s thesis, K.U.Leuven, Belgium (2008)
Page, D., Chen, L., Smart, N.P.: On the design and implementation of an efficient daa scheme. Cryptology ePrint Archive, Report 2009/598 (2009), http://eprint.iacr.org/
RSA Labs. PKCS1 v2.1: RSA Cryptography Standard (2001)
Mitchel, C.: Direct Anonymous Attestation in Context. In: Trusted Computing (Professional Applications of Computing), Piscataway, NJ, USA, pp. 143–174. IEEE Computer Society Press, Los Alamitos (2005)
SUN Community process: Java Specification Request (JSR-177): Security and Trust Services API. Specification (September 2004), http://jcp.org/en/jsr/detail?id=177
SUN Community process: Java Specification Request (JSR-257): Contactless Communication API. Specification (October 2004), http://jcp.org/en/jsr/detail?id=257
Sterckx, M., Gierlichs, B., Preneel, B., Verbauwhede, I.: Efficient Implementation of Anonymous Credentials on Java Card Smart Cards. In: 1st IEEE International Workshop on Information Forensics and Security (WIFS 2009), London,UK, pp. 106–110. IEEE Computer Society Press, Los Alamitos (2009)
SUN Community process JSR 139. J2ME(TM) Connected Limited Device Configuration (CLDC) Specification 1.1 Final Release. Specification (March 4, 2004), http://jcp.org/aboutJava/communityprocess/final/jsr139/index.html
Trusted Computing Group Mobile Phone Working Group. TCG Mobile Trusted Module Sepecification Version 1 rev. 1.0 Specification (June 12, 2007), https://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-trusted-module-1.0.pdf
Trusted Computing Group - TPM Working Group: TPM Main Part 3 Commands. Specification (October 26, 2006), http://www.trustedcomputinggroup.org/files/static_page_files/ACD28F6C-1D09-3519-AD210DC2597FE4C/mainP3Commandsrev103.pdf Specification version 1.2 Level 2 Revision 103
Trusted-Computing-Group-TSS-Working-Group. TCG Software Stack (TSS) Specification Version 1.2 Level 1. Specification (January 6, 2006), https://www.trustedcomputinggroup.org/specs/TSS/TSS_Version_1.2_Level_1_FINAL.pdf ; Part1: Commands and Structures
Winter, J.: Trusted computing building blocks for embedded linux-based arm trustzone platforms. In: Proceedings of the 3rd ACM workshop on Scalable trusted computing, STC 2008, pp. 21–30. ACM, New York (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dietrich, K. (2010). Anonymous RFID Authentication Using Trusted Computing Technologies. In: Ors Yalcin, S.B. (eds) Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2010. Lecture Notes in Computer Science, vol 6370. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16822-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-16822-2_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16821-5
Online ISBN: 978-3-642-16822-2
eBook Packages: Computer ScienceComputer Science (R0)