Snarky signatures: Minimal signatures of knowledge from simulation-extractable SNARKs
We construct a pairing based simulation-extractable SNARK (SE-SNARK) that consists of
only 3 group elements and has highly efficient verification. By formally linking SE-SNARKs to …
only 3 group elements and has highly efficient verification. By formally linking SE-SNARKs to …
Anonymous attestation using the strong diffie hellman assumption revisited
Abstract Direct Anonymous Attestation (DAA) is a cryptographic protocol for privacy-
protecting authentication. It is standardized in the TPM standard and implemented in millions …
protecting authentication. It is standardized in the TPM standard and implemented in millions …
Secure multiparty computation from SGX
In this paper we show how Isolated Execution Environments (IEE) offered by novel
commodity hardware such as Intel's SGX provide a new path to constructing general secure …
commodity hardware such as Intel's SGX provide a new path to constructing general secure …
Enhanced privacy ID from bilinear pairing for hardware authentication and attestation
E Brickell, J Li - … Journal of Information Privacy, Security and …, 2011 - inderscienceonline.com
Enhanced privacy ID (EPID) is a cryptographic scheme that enables the remote
authentication and attestation of a hardware device while preserving the privacy of the …
authentication and attestation of a hardware device while preserving the privacy of the …
Get shorty via group signatures without encryption
Group signatures allow group members to anonymously sign messages in the name of a
group such that only a dedicated opening authority can reveal the exact signer behind a …
group such that only a dedicated opening authority can reveal the exact signer behind a …
Flexible and scalable digital signatures in TPM 2.0
L Chen, J Li - Proceedings of the 2013 ACM SIGSAC conference on …, 2013 - dl.acm.org
Trusted Platform Modules (TPM) are multipurpose hardware chips, which provide support for
various cryptographic functions. Flexibility, scalability and high performance are critical …
various cryptographic functions. Flexibility, scalability and high performance are critical …
Universally composable direct anonymous attestation
Abstract Direct Anonymous Attestation (DAA) is one of the most complex cryptographic
algorithms that has been deployed in practice. In spite of this and the long body of work on …
algorithms that has been deployed in practice. In spite of this and the long body of work on …
On the design and implementation of an efficient DAA scheme
Abstract Direct Anonymous Attestation (DAA) is an anonymous digital signature scheme that
aims to provide both signer authentication and privacy. One of the properties that makes …
aims to provide both signer authentication and privacy. One of the properties that makes …
Foundations of hardware-based attested computation and application to SGX
Exciting new capabilities of modern trusted hardware technologies allow for the execution of
arbitrary code within environments completely isolated from the rest of the system and …
arbitrary code within environments completely isolated from the rest of the system and …
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings
E Brickell, L Chen, J Li - International journal of information security, 2009 - Springer
Abstract Direct Anonymous Attestation (DAA) is a cryptographic mechanism that enables
remote authentication of a user while preserving privacy under the user's control. The DAA …
remote authentication of a user while preserving privacy under the user's control. The DAA …