1. Anonymous RFID Authentication Using Trusted Computing Technologies.
- Author
-
Dietrich, Kurt
- Abstract
Anonymity protecting mechanisms are an important part of any Trusted Computing platform. They provide protection of a platform΄s anonymity and, consequently, protection of the privacy of the platform΄s owners. As Trusted Computing technologies have been introduced on mobile and embedded systems and more and more mobile devices are equipped with Near Field Communication (NFC) modules, the question arises whether the supported anonymization mechanisms can be used efficiently for anonymous authentication for NFC enabled applications. However, state-of-the-art technologies like the Direct Anonymous Attestation scheme require complex mathematical computations that put high requirements on the processing power of the signer΄s device which are typically not available on resource constrained devices like smart-cards. In this paper, we analyze how the Direct Anonymous Attestation protocol can be used for anonymous authentication in NFC scenarios and we propose an approach that allows a practical use of this technology in real-world scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF