Key attestation from trusted execution environments

6Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Credential platforms implemented on top of Trusted Execution Environments (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwords, securely. One important requirement for a TrEE-based credential platform is the ability to attest that a credential has been created and is kept within the TrEE. Credential properties, such as usage permissions, should be also attested. Existing attestation mechanisms are limited to attesting which applications outside the TrEE are authorized to use the credential. In this paper we describe a novel key attestation mechanism that allows attestation of both TrEE internal and external key usage permissions. We have implemented this attestation mechanism for mobile phones with M-Shield TrEE. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Kostiainen, K., Dmitrienko, A., Ekberg, J. E., Sadeghi, A. R., & Asokan, N. (2010). Key attestation from trusted execution environments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6101 LNCS, pp. 30–46). https://doi.org/10.1007/978-3-642-13869-0_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free