Credential platforms implemented on top of Trusted Execution Environments (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwords, securely. One important requirement for a TrEE-based credential platform is the ability to attest that a credential has been created and is kept within the TrEE. Credential properties, such as usage permissions, should be also attested. Existing attestation mechanisms are limited to attesting which applications outside the TrEE are authorized to use the credential. In this paper we describe a novel key attestation mechanism that allows attestation of both TrEE internal and external key usage permissions. We have implemented this attestation mechanism for mobile phones with M-Shield TrEE. © 2010 Springer-Verlag.
CITATION STYLE
Kostiainen, K., Dmitrienko, A., Ekberg, J. E., Sadeghi, A. R., & Asokan, N. (2010). Key attestation from trusted execution environments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6101 LNCS, pp. 30–46). https://doi.org/10.1007/978-3-642-13869-0_3
Mendeley helps you to discover research relevant for your work.