SlideShare une entreprise Scribd logo
1  sur  12
ENHANCED PRIVACY ID
                   A DIRECT ANONYMOUS ATTESTATION SCHEME WITH
                              ENHANCED REVOCATION CAPABILITIES


Under the Guidance of Ms. K.Revathi


Presented by:
 Zeeshan Afaque (1030920074)
 Sagar Gupta(1030920058)
 Sajid Mujtaba(1030920059)
 Shubham Chaturvedi(1030920075)
Explanation…
Direct Anonymous Attestation (DAA)
   Enables Remote Authentication of trusted platform.
   Preserves user privacy and Linkability.
   TPM proves validness to the remote requesting party.
   TPM can be revoked only if the DAA private key in
    extracted
   Publishing of private key is necessary.
   TPM cannot be revoked if private key is not sent to
    verifier
Abstract…
   A new Scheme can be developed called EPID( Enhances
    privacy scheme).
   Provides Unlinkability in a more secure manner.
   TPM can be revoked even if the Private key is
    unknown.
   No need to distribute the private key.
   Same security model as in DAA
   More efficient in exception handling than the
    conventional DAA.
Terminologies…

 DAA    : Direct Anonymous Attestation
 TPM    : Trusted Platform Module
 EPID   : Enhanced Privacy ID
Existing System…
o   In DAA, an issuer creates group public key.
o   TPM obtains unique key from the issuer.
o   For authentication the TPM Generates a Signature.
o   The verifier verifies the generated signature.
o   If the TPM was found compromised, the private key is placed in the
    revocation list.
o   Verifier checks the signature against the Revocation list.
o   The appropriate result is issued.
Proposed System…
   EPID is developed.
   Enhanced revocation capabilities.
   Broader capability beyond attestation and TCG(trusted computation group).
   Contains four Entities:
         •   Issuer.
         •   Revocation manager
         •   User
         •   Verifier
   The issuer can be the same entity as the revocation manager.
   The signatures must be:
                          Unforgeable .
                          Anonymous.
                          Unlinkable.
Software Requirements…

   Operating System   -   Windows XP
   Platform           -   Visual Studio .NET 2008
   Database           -   SQL Server 2005
   Languages          -   Asp.Net , C#.Net
Hardware Requirements…

   Hard Disk       -   20 GB
   Monitor         -   15’ Color with VGI card support
   RAM             -   Minimum 1 GB
   Processor       -   Pentium IV and Above (or) Equivalent
   Processor Speed -   Minimum 500 MHz speed
Algorithm…
EPID scheme consists of four procedures :



 Setup : The issuer creates a group
  public key and a group issuing private key. The Issuer
  publishes the group public key.

 Join   : Protocol between the issuer and a user that
  results in the user becoming a new group member. At the
  end, the user obtains a membership private key from the
  issuer.
 Proof     of membership :         A prover interacts with a
    verifier to convince the verifier that he is a member of
    the group by following ways-
   The prover sends a request to the verifier.
   The verifier responds with a message m.
   The prover generates a signature on m based on his
    membership private key.
    The verifier verifies the signature using the group public
    key.
 Revocation : The revocation manager puts a group
    member into the revocation list. There are three types of
    revocations:
    Private-key-based revocation in which the revocation
    manager revokes a user based on the user’s membership
    private key.
    Signature based revocation in which the revocation
    manager revokes a user based on the signatures created
    by the user.
    Issuer-based revocation in which the revocation manager
    revokes a user based on the recommendation from the
    issuer.
Thank you !!

Contenu connexe

En vedette

Sourajit Aiyer - Dhaka Tribune - Microfinance - A catalyst to boost rural demand
Sourajit Aiyer - Dhaka Tribune - Microfinance - A catalyst to boost rural demandSourajit Aiyer - Dhaka Tribune - Microfinance - A catalyst to boost rural demand
Sourajit Aiyer - Dhaka Tribune - Microfinance - A catalyst to boost rural demandSouth Asia Fast Track
 
Alternanza Unicam Istituto Meucci Castelfidardo
Alternanza Unicam Istituto Meucci CastelfidardoAlternanza Unicam Istituto Meucci Castelfidardo
Alternanza Unicam Istituto Meucci Castelfidardomarco anselmi
 
LGBT Travel: LGBT Week NYC 2015
LGBT Travel: LGBT Week NYC 2015LGBT Travel: LGBT Week NYC 2015
LGBT Travel: LGBT Week NYC 2015MWWPR
 
Event Management 111208ieu
Event Management 111208ieuEvent Management 111208ieu
Event Management 111208ieuHakan Turkkusu
 
Social class
Social classSocial class
Social classkas053
 
το παραμύθι για την φύση
το παραμύθι για την φύσητο παραμύθι για την φύση
το παραμύθι για την φύσηGiota Papakyr
 
Cpns daerah kota sibolga ta 2014
Cpns daerah kota sibolga ta 2014Cpns daerah kota sibolga ta 2014
Cpns daerah kota sibolga ta 2014Hendra Sirait
 
المجلة السودانية لدراسات الراي العام
المجلة السودانية لدراسات الراي العامالمجلة السودانية لدراسات الراي العام
المجلة السودانية لدراسات الراي العامHamza Omer
 
Istorija interneta
Istorija internetaIstorija interneta
Istorija internetaAna Đorić
 
History ofchittagongvol2
History ofchittagongvol2History ofchittagongvol2
History ofchittagongvol2kabarakhine
 
Brands Go Visual: Marketing in the Age of the Image
Brands Go Visual: Marketing in the Age of the ImageBrands Go Visual: Marketing in the Age of the Image
Brands Go Visual: Marketing in the Age of the ImageMWWPR
 

En vedette (20)

Sourajit Aiyer - Dhaka Tribune - Microfinance - A catalyst to boost rural demand
Sourajit Aiyer - Dhaka Tribune - Microfinance - A catalyst to boost rural demandSourajit Aiyer - Dhaka Tribune - Microfinance - A catalyst to boost rural demand
Sourajit Aiyer - Dhaka Tribune - Microfinance - A catalyst to boost rural demand
 
Alternanza Unicam Istituto Meucci Castelfidardo
Alternanza Unicam Istituto Meucci CastelfidardoAlternanza Unicam Istituto Meucci Castelfidardo
Alternanza Unicam Istituto Meucci Castelfidardo
 
Contempt - a Balancing Act. Attorney General, 1 December 2011
Contempt - a Balancing Act. Attorney General, 1 December 2011Contempt - a Balancing Act. Attorney General, 1 December 2011
Contempt - a Balancing Act. Attorney General, 1 December 2011
 
LGBT Travel: LGBT Week NYC 2015
LGBT Travel: LGBT Week NYC 2015LGBT Travel: LGBT Week NYC 2015
LGBT Travel: LGBT Week NYC 2015
 
Event Management 111208ieu
Event Management 111208ieuEvent Management 111208ieu
Event Management 111208ieu
 
CPT211_CS_USM_12_13
CPT211_CS_USM_12_13CPT211_CS_USM_12_13
CPT211_CS_USM_12_13
 
Social class
Social classSocial class
Social class
 
23
2323
23
 
το παραμύθι για την φύση
το παραμύθι για την φύσητο παραμύθι για την φύση
το παραμύθι για την φύση
 
Cpns daerah kota sibolga ta 2014
Cpns daerah kota sibolga ta 2014Cpns daerah kota sibolga ta 2014
Cpns daerah kota sibolga ta 2014
 
Distributed DBMS - Unit 3 - Distributed DBMS Architecture
Distributed DBMS - Unit 3 - Distributed DBMS ArchitectureDistributed DBMS - Unit 3 - Distributed DBMS Architecture
Distributed DBMS - Unit 3 - Distributed DBMS Architecture
 
презентация1
презентация1презентация1
презентация1
 
Узбекистан
УзбекистанУзбекистан
Узбекистан
 
Education systems uk
Education systems ukEducation systems uk
Education systems uk
 
المجلة السودانية لدراسات الراي العام
المجلة السودانية لدراسات الراي العامالمجلة السودانية لدراسات الراي العام
المجلة السودانية لدراسات الراي العام
 
Istorija interneta
Istorija internetaIstorija interneta
Istorija interneta
 
Catalogue ecobuild 2012
Catalogue ecobuild 2012Catalogue ecobuild 2012
Catalogue ecobuild 2012
 
Enlaces
EnlacesEnlaces
Enlaces
 
History ofchittagongvol2
History ofchittagongvol2History ofchittagongvol2
History ofchittagongvol2
 
Brands Go Visual: Marketing in the Age of the Image
Brands Go Visual: Marketing in the Age of the ImageBrands Go Visual: Marketing in the Age of the Image
Brands Go Visual: Marketing in the Age of the Image
 

Similaire à Enhanced privacy ID

Session 10 Tp 10
Session 10 Tp 10Session 10 Tp 10
Session 10 Tp 10githe26200
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)Wail Hassan
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authenticationZTech Proje
 
Security In .Net Framework
Security In .Net FrameworkSecurity In .Net Framework
Security In .Net FrameworkRamakanta Behera
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxgilpinleeanna
 
Secure 3 kany-vanda
Secure 3 kany-vandaSecure 3 kany-vanda
Secure 3 kany-vandaVanda KANY
 
The Best Practices of Symantec Code Signing - RapidSSLonline
The Best Practices of Symantec Code Signing - RapidSSLonlineThe Best Practices of Symantec Code Signing - RapidSSLonline
The Best Practices of Symantec Code Signing - RapidSSLonlineRapidSSLOnline.com
 
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft AzureUno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft AzureGiuliano Latini
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructureAditya Nama
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key InfrastructureTheo Gravity
 
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...Farooq Khan
 
trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.pptnaghamallella
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyIJERA Editor
 

Similaire à Enhanced privacy ID (20)

Session 10 Tp 10
Session 10 Tp 10Session 10 Tp 10
Session 10 Tp 10
 
Group signature
Group signatureGroup signature
Group signature
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Security In .Net Framework
Security In .Net FrameworkSecurity In .Net Framework
Security In .Net Framework
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
 
Secure 3 kany-vanda
Secure 3 kany-vandaSecure 3 kany-vanda
Secure 3 kany-vanda
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
 
The Best Practices of Symantec Code Signing - RapidSSLonline
The Best Practices of Symantec Code Signing - RapidSSLonlineThe Best Practices of Symantec Code Signing - RapidSSLonline
The Best Practices of Symantec Code Signing - RapidSSLonline
 
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft AzureUno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
 
Spo1 w21
Spo1 w21Spo1 w21
Spo1 w21
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
FIDOAlliance
FIDOAllianceFIDOAlliance
FIDOAlliance
 
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
 
trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.ppt
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
Vinod Rebello
Vinod RebelloVinod Rebello
Vinod Rebello
 
Mimikatz
MimikatzMimikatz
Mimikatz
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 

Dernier (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

Enhanced privacy ID

  • 1. ENHANCED PRIVACY ID A DIRECT ANONYMOUS ATTESTATION SCHEME WITH ENHANCED REVOCATION CAPABILITIES Under the Guidance of Ms. K.Revathi Presented by:  Zeeshan Afaque (1030920074)  Sagar Gupta(1030920058)  Sajid Mujtaba(1030920059)  Shubham Chaturvedi(1030920075)
  • 2. Explanation… Direct Anonymous Attestation (DAA)  Enables Remote Authentication of trusted platform.  Preserves user privacy and Linkability.  TPM proves validness to the remote requesting party.  TPM can be revoked only if the DAA private key in extracted  Publishing of private key is necessary.  TPM cannot be revoked if private key is not sent to verifier
  • 3. Abstract…  A new Scheme can be developed called EPID( Enhances privacy scheme).  Provides Unlinkability in a more secure manner.  TPM can be revoked even if the Private key is unknown.  No need to distribute the private key.  Same security model as in DAA  More efficient in exception handling than the conventional DAA.
  • 4. Terminologies…  DAA : Direct Anonymous Attestation  TPM : Trusted Platform Module  EPID : Enhanced Privacy ID
  • 5. Existing System… o In DAA, an issuer creates group public key. o TPM obtains unique key from the issuer. o For authentication the TPM Generates a Signature. o The verifier verifies the generated signature. o If the TPM was found compromised, the private key is placed in the revocation list. o Verifier checks the signature against the Revocation list. o The appropriate result is issued.
  • 6. Proposed System…  EPID is developed.  Enhanced revocation capabilities.  Broader capability beyond attestation and TCG(trusted computation group).  Contains four Entities: • Issuer. • Revocation manager • User • Verifier  The issuer can be the same entity as the revocation manager.  The signatures must be:  Unforgeable .  Anonymous.  Unlinkable.
  • 7. Software Requirements…  Operating System - Windows XP  Platform - Visual Studio .NET 2008  Database - SQL Server 2005  Languages - Asp.Net , C#.Net
  • 8. Hardware Requirements…  Hard Disk - 20 GB  Monitor - 15’ Color with VGI card support  RAM - Minimum 1 GB  Processor - Pentium IV and Above (or) Equivalent  Processor Speed - Minimum 500 MHz speed
  • 9. Algorithm… EPID scheme consists of four procedures :  Setup : The issuer creates a group public key and a group issuing private key. The Issuer publishes the group public key.  Join : Protocol between the issuer and a user that results in the user becoming a new group member. At the end, the user obtains a membership private key from the issuer.
  • 10.  Proof of membership : A prover interacts with a verifier to convince the verifier that he is a member of the group by following ways-  The prover sends a request to the verifier.  The verifier responds with a message m.  The prover generates a signature on m based on his membership private key.  The verifier verifies the signature using the group public key.
  • 11.  Revocation : The revocation manager puts a group member into the revocation list. There are three types of revocations:  Private-key-based revocation in which the revocation manager revokes a user based on the user’s membership private key.  Signature based revocation in which the revocation manager revokes a user based on the signatures created by the user.  Issuer-based revocation in which the revocation manager revokes a user based on the recommendation from the issuer.