Pairings in trusted computing

70Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly simplified or expanded using the mathematical structures of different types of pairings. In this paper we consider another advanced application of pairings, namely to the Direct Anonymous Attestation (DAA) schemes as found in the Trusted Computing Group standards. We show that a recent DAA proposal can be further optimized by transferring the underlying pairing groups from the symmetric to the asymmetric settings. This provides a more efficient and scalable solution than the existing RSA and pairing based DAA schemes. © Springer-Verlag Berlin Heidelberg 2008.

Cite

CITATION STYLE

APA

Chen, L., Morrissey, P., & Smart, N. P. (2008). Pairings in trusted computing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5209 LNCS, pp. 1–17). https://doi.org/10.1007/978-3-540-85538-5_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free