Direct anonymous attestation scheme with outsourcing capability
First Claim
Patent Images
1. A method comprising:
- generating a portion of a signature at a first computer;
the first computer requesting a second computer to generate a second portion of the signature while maintaining privacy of the portion of the private membership key; and
generating the second portion of the signature at the second computer.
1 Assignment
0 Petitions
Accused Products
Abstract
A Direct Anonymous Attestation (DAA) scheme using elliptic curve cryptography (ECC) and bilinear maps. A trusted platform module (TPM) may maintain privacy of a portion of a private membership key from an issuer while joining a group. Moreover, the TPM can outsource most of the computation involved in generating a signature to a host computer.
-
Citations
30 Claims
-
1. A method comprising:
-
generating a portion of a signature at a first computer; the first computer requesting a second computer to generate a second portion of the signature while maintaining privacy of the portion of the private membership key; and generating the second portion of the signature at the second computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
requesting admission to a group while maintaining privacy of a first portion of a private membership key. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
20. A method comprising:
-
generating a signature at a first computer; transmitting the signature to a second computer while maintaining privacy of a first portion of a private key of the first computer; and verifying the signature. - View Dependent Claims (21, 22)
-
-
23. An article of manufacture including a machine readable medium having instructions stored thereon, which when executed cause a machine to:
-
generate a portion of a signature at a first computer; and request a second computer to generate a second portion of the signature while maintaining privacy of a portion of the private membership key. - View Dependent Claims (24, 25)
-
-
26. A system comprising:
-
a prover platform coupled to the network, wherein the prover platform comprises a Trusted Platform Module (TPM) and a host computer, wherein; the TPM is to generate a portion of a signature and the TPM is to request the host computer to generate a second portion of the signature while maintaining privacy of a portion of the private membership key; and a verifier coupled to a network, wherein the verifier is to verify the signature. - View Dependent Claims (27, 28, 29, 30)
-
Specification