Skip to main content

Anonymous RFID Authentication Using Trusted Computing Technologies

  • Conference paper
Radio Frequency Identification: Security and Privacy Issues (RFIDSec 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6370))

Abstract

Anonymity protecting mechanisms are an important part of any Trusted Computing platform. They provide protection of a platform’s anonymity and, consequently, protection of the privacy of the platform’s owners. As Trusted Computing technologies have been introduced on mobile and embedded systems and more and more mobile devices are equipped with Near Field Communication (NFC) modules, the question arises whether the supported anonymization mechanisms can be used efficiently for anonymous authentication for NFC enabled applications. However, state-of-the-art technologies like the Direct Anonymous Attestation scheme require complex mathematical computations that put high requirements on the processing power of the signer’s device which are typically not available on resource constrained devices like smart-cards. In this paper, we analyze how the Direct Anonymous Attestation protocol can be used for anonymous authentication in NFC scenarios and we propose an approach that allows a practical use of this technology in real-world scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. ARM Ltd: TrustZone Technology Overview. Introduction, http://www.arm.com/products/esd/trustzone_home.html

  2. Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous credentials on a standard java card. In: Proceedings of the 16th ACM conference on Computer and communications security, CCS 2009, Chicago, Illinois, USA, pp. 600–610. ACM, New York (2009)

    Chapter  Google Scholar 

  3. Brands, S.A.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge (2000)

    Google Scholar 

  4. Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation. In: Proceedings of the 11th ACM conference on Computer and communications security, CCS2004, Washington DC, USA, pp. 132–145. ACM, New York (2004)

    Chapter  Google Scholar 

  5. Chen, L.: A daa scheme requiring less tpm resources. Cryptology ePrint Archive, Report 2010/008 (2010), http://eprint.iacr.org/

  6. Dietrich, K.: An Integrated Architecture for Trusted Computing for Java Enabled Embedded Devices. In: Proceedings of the 2007 ACM workshop on Scalable trusted computing, STC 2007, pp. 2–6. ACM Press, New York (2007)

    Chapter  Google Scholar 

  7. Dietrich, K.: Anonymous Credentials for Java Enabled Platforms. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol. 6163, pp. 88–103. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Dietrich, K., Winter, J.: Implementation aspects of mobile and embedded trusted computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 29–44. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  9. Balasch Masoliver, J.M.: Smart Card Implementation of Anonymous Credentials. Master’s thesis, K.U.Leuven, Belgium (2008)

    Google Scholar 

  10. Page, D., Chen, L., Smart, N.P.: On the design and implementation of an efficient daa scheme. Cryptology ePrint Archive, Report 2009/598 (2009), http://eprint.iacr.org/

  11. RSA Labs. PKCS1 v2.1: RSA Cryptography Standard (2001)

    Google Scholar 

  12. Mitchel, C.: Direct Anonymous Attestation in Context. In: Trusted Computing (Professional Applications of Computing), Piscataway, NJ, USA, pp. 143–174. IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  13. SUN Community process: Java Specification Request (JSR-177): Security and Trust Services API. Specification (September 2004), http://jcp.org/en/jsr/detail?id=177

  14. SUN Community process: Java Specification Request (JSR-257): Contactless Communication API. Specification (October 2004), http://jcp.org/en/jsr/detail?id=257

  15. Sterckx, M., Gierlichs, B., Preneel, B., Verbauwhede, I.: Efficient Implementation of Anonymous Credentials on Java Card Smart Cards. In: 1st IEEE International Workshop on Information Forensics and Security (WIFS 2009), London,UK, pp. 106–110. IEEE Computer Society Press, Los Alamitos (2009)

    Chapter  Google Scholar 

  16. SUN Community process JSR 139. J2ME(TM) Connected Limited Device Configuration (CLDC) Specification 1.1 Final Release. Specification (March 4, 2004), http://jcp.org/aboutJava/communityprocess/final/jsr139/index.html

  17. Trusted Computing Group Mobile Phone Working Group. TCG Mobile Trusted Module Sepecification Version 1 rev. 1.0 Specification (June 12, 2007), https://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-trusted-module-1.0.pdf

  18. Trusted Computing Group - TPM Working Group: TPM Main Part 3 Commands. Specification (October 26, 2006), http://www.trustedcomputinggroup.org/files/static_page_files/ACD28F6C-1D09-3519-AD210DC2597FE4C/mainP3Commandsrev103.pdf Specification version 1.2 Level 2 Revision 103

  19. Trusted-Computing-Group-TSS-Working-Group. TCG Software Stack (TSS) Specification Version 1.2 Level 1. Specification (January 6, 2006), https://www.trustedcomputinggroup.org/specs/TSS/TSS_Version_1.2_Level_1_FINAL.pdf ; Part1: Commands and Structures

  20. Winter, J.: Trusted computing building blocks for embedded linux-based arm trustzone platforms. In: Proceedings of the 3rd ACM workshop on Scalable trusted computing, STC 2008, pp. 21–30. ACM, New York (2008)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dietrich, K. (2010). Anonymous RFID Authentication Using Trusted Computing Technologies. In: Ors Yalcin, S.B. (eds) Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2010. Lecture Notes in Computer Science, vol 6370. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16822-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16822-2_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16821-5

  • Online ISBN: 978-3-642-16822-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics