On the Feasibility of T-PKI as an Anonymization Protocol for TPMs in Trusted Computing Environments

2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)(2022)

引用 0|浏览1
暂无评分
摘要
The feasibility of the Transactional Public Key Infrastructure (T-PKI) cryptographic scheme as the means to anonymize attestation in a trusted computing environment is assessed. T-PKI encryption scheme creates a new public key for every transaction from the same private key. T-PKI would allow a TPM to send anonymous attestations to a verifier, thus not revealing any information about the origin of the attestation. A functional implementation of the T-PKI encryption scheme based on the Python programming language along with General Multi-Precision Arithmetic (GMP) library for large arithmetic operations, and Numeric Python (NumPy) for matrix calculations is presented. An implementation of the Learning with Errors using the same interface is also presented to compare the output from both cryptographic schemes. Both methods utilize a 384-bit secret for encryption and can encrypt a character (7-bits) simultaneously.
更多
查看译文
关键词
Anonymity,Security,Cloud,TPM,TCG,Lattice cryptography,Quantum safe
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要