SlideShare ist ein Scribd-Unternehmen logo
1 von 12
ENHANCED PRIVACY ID
                   A DIRECT ANONYMOUS ATTESTATION SCHEME WITH
                              ENHANCED REVOCATION CAPABILITIES


Under the Guidance of Ms. K.Revathi


Presented by:
 Zeeshan Afaque (1030920074)
 Sagar Gupta(1030920058)
 Sajid Mujtaba(1030920059)
 Shubham Chaturvedi(1030920075)
Explanation…
Direct Anonymous Attestation (DAA)
   Enables Remote Authentication of trusted platform.
   Preserves user privacy and Linkability.
   TPM proves validness to the remote requesting party.
   TPM can be revoked only if the DAA private key in
    extracted
   Publishing of private key is necessary.
   TPM cannot be revoked if private key is not sent to
    verifier
Abstract…
   A new Scheme can be developed called EPID( Enhances
    privacy scheme).
   Provides Unlinkability in a more secure manner.
   TPM can be revoked even if the Private key is
    unknown.
   No need to distribute the private key.
   Same security model as in DAA
   More efficient in exception handling than the
    conventional DAA.
Terminologies…

 DAA    : Direct Anonymous Attestation
 TPM    : Trusted Platform Module
 EPID   : Enhanced Privacy ID
Existing System…
o   In DAA, an issuer creates group public key.
o   TPM obtains unique key from the issuer.
o   For authentication the TPM Generates a Signature.
o   The verifier verifies the generated signature.
o   If the TPM was found compromised, the private key is placed in the
    revocation list.
o   Verifier checks the signature against the Revocation list.
o   The appropriate result is issued.
Proposed System…
   EPID is developed.
   Enhanced revocation capabilities.
   Broader capability beyond attestation and TCG(trusted computation group).
   Contains four Entities:
         •   Issuer.
         •   Revocation manager
         •   User
         •   Verifier
   The issuer can be the same entity as the revocation manager.
   The signatures must be:
                          Unforgeable .
                          Anonymous.
                          Unlinkable.
Software Requirements…

   Operating System   -   Windows XP
   Platform           -   Visual Studio .NET 2008
   Database           -   SQL Server 2005
   Languages          -   Asp.Net , C#.Net
Hardware Requirements…

   Hard Disk       -   20 GB
   Monitor         -   15’ Color with VGI card support
   RAM             -   Minimum 1 GB
   Processor       -   Pentium IV and Above (or) Equivalent
   Processor Speed -   Minimum 500 MHz speed
Algorithm…
EPID scheme consists of four procedures :



 Setup : The issuer creates a group
  public key and a group issuing private key. The Issuer
  publishes the group public key.

 Join   : Protocol between the issuer and a user that
  results in the user becoming a new group member. At the
  end, the user obtains a membership private key from the
  issuer.
 Proof     of membership :         A prover interacts with a
    verifier to convince the verifier that he is a member of
    the group by following ways-
   The prover sends a request to the verifier.
   The verifier responds with a message m.
   The prover generates a signature on m based on his
    membership private key.
    The verifier verifies the signature using the group public
    key.
 Revocation : The revocation manager puts a group
    member into the revocation list. There are three types of
    revocations:
    Private-key-based revocation in which the revocation
    manager revokes a user based on the user’s membership
    private key.
    Signature based revocation in which the revocation
    manager revokes a user based on the signatures created
    by the user.
    Issuer-based revocation in which the revocation manager
    revokes a user based on the recommendation from the
    issuer.
Thank you !!

Weitere ähnliche Inhalte

Andere mochten auch

Social class
Social classSocial class
Social class
kas053
 
το παραμύθι για την φύση
το παραμύθι για την φύσητο παραμύθι για την φύση
το παραμύθι για την φύση
Giota Papakyr
 
Istorija interneta
Istorija internetaIstorija interneta
Istorija interneta
Ana Đorić
 
History ofchittagongvol2
History ofchittagongvol2History ofchittagongvol2
History ofchittagongvol2
kabarakhine
 

Andere mochten auch (20)

Sourajit Aiyer - Dhaka Tribune - Microfinance - A catalyst to boost rural demand
Sourajit Aiyer - Dhaka Tribune - Microfinance - A catalyst to boost rural demandSourajit Aiyer - Dhaka Tribune - Microfinance - A catalyst to boost rural demand
Sourajit Aiyer - Dhaka Tribune - Microfinance - A catalyst to boost rural demand
 
Alternanza Unicam Istituto Meucci Castelfidardo
Alternanza Unicam Istituto Meucci CastelfidardoAlternanza Unicam Istituto Meucci Castelfidardo
Alternanza Unicam Istituto Meucci Castelfidardo
 
Contempt - a Balancing Act. Attorney General, 1 December 2011
Contempt - a Balancing Act. Attorney General, 1 December 2011Contempt - a Balancing Act. Attorney General, 1 December 2011
Contempt - a Balancing Act. Attorney General, 1 December 2011
 
LGBT Travel: LGBT Week NYC 2015
LGBT Travel: LGBT Week NYC 2015LGBT Travel: LGBT Week NYC 2015
LGBT Travel: LGBT Week NYC 2015
 
Event Management 111208ieu
Event Management 111208ieuEvent Management 111208ieu
Event Management 111208ieu
 
CPT211_CS_USM_12_13
CPT211_CS_USM_12_13CPT211_CS_USM_12_13
CPT211_CS_USM_12_13
 
Social class
Social classSocial class
Social class
 
23
2323
23
 
το παραμύθι για την φύση
το παραμύθι για την φύσητο παραμύθι για την φύση
το παραμύθι για την φύση
 
Cpns daerah kota sibolga ta 2014
Cpns daerah kota sibolga ta 2014Cpns daerah kota sibolga ta 2014
Cpns daerah kota sibolga ta 2014
 
Distributed DBMS - Unit 3 - Distributed DBMS Architecture
Distributed DBMS - Unit 3 - Distributed DBMS ArchitectureDistributed DBMS - Unit 3 - Distributed DBMS Architecture
Distributed DBMS - Unit 3 - Distributed DBMS Architecture
 
презентация1
презентация1презентация1
презентация1
 
Узбекистан
УзбекистанУзбекистан
Узбекистан
 
Education systems uk
Education systems ukEducation systems uk
Education systems uk
 
المجلة السودانية لدراسات الراي العام
المجلة السودانية لدراسات الراي العامالمجلة السودانية لدراسات الراي العام
المجلة السودانية لدراسات الراي العام
 
Istorija interneta
Istorija internetaIstorija interneta
Istorija interneta
 
Catalogue ecobuild 2012
Catalogue ecobuild 2012Catalogue ecobuild 2012
Catalogue ecobuild 2012
 
Enlaces
EnlacesEnlaces
Enlaces
 
History ofchittagongvol2
History ofchittagongvol2History ofchittagongvol2
History ofchittagongvol2
 
Brands Go Visual: Marketing in the Age of the Image
Brands Go Visual: Marketing in the Age of the ImageBrands Go Visual: Marketing in the Age of the Image
Brands Go Visual: Marketing in the Age of the Image
 

Ähnlich wie Enhanced privacy ID

Session 10 Tp 10
Session 10 Tp 10Session 10 Tp 10
Session 10 Tp 10
githe26200
 
Security In .Net Framework
Security In .Net FrameworkSecurity In .Net Framework
Security In .Net Framework
Ramakanta Behera
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
gilpinleeanna
 

Ähnlich wie Enhanced privacy ID (20)

Session 10 Tp 10
Session 10 Tp 10Session 10 Tp 10
Session 10 Tp 10
 
Group signature
Group signatureGroup signature
Group signature
 
Module 4 (enumeration)
Module 4 (enumeration)Module 4 (enumeration)
Module 4 (enumeration)
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Security In .Net Framework
Security In .Net FrameworkSecurity In .Net Framework
Security In .Net Framework
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
 
Secure 3 kany-vanda
Secure 3 kany-vandaSecure 3 kany-vanda
Secure 3 kany-vanda
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
 
The Best Practices of Symantec Code Signing - RapidSSLonline
The Best Practices of Symantec Code Signing - RapidSSLonlineThe Best Practices of Symantec Code Signing - RapidSSLonline
The Best Practices of Symantec Code Signing - RapidSSLonline
 
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft AzureUno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
 
Spo1 w21
Spo1 w21Spo1 w21
Spo1 w21
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
FIDOAlliance
FIDOAllianceFIDOAlliance
FIDOAlliance
 
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
SDWAN Concept - Certificate and keys Roles in Controllers and vEdge Router Au...
 
trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.ppt
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
Vinod Rebello
Vinod RebelloVinod Rebello
Vinod Rebello
 
Mimikatz
MimikatzMimikatz
Mimikatz
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Kürzlich hochgeladen (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 

Enhanced privacy ID

  • 1. ENHANCED PRIVACY ID A DIRECT ANONYMOUS ATTESTATION SCHEME WITH ENHANCED REVOCATION CAPABILITIES Under the Guidance of Ms. K.Revathi Presented by:  Zeeshan Afaque (1030920074)  Sagar Gupta(1030920058)  Sajid Mujtaba(1030920059)  Shubham Chaturvedi(1030920075)
  • 2. Explanation… Direct Anonymous Attestation (DAA)  Enables Remote Authentication of trusted platform.  Preserves user privacy and Linkability.  TPM proves validness to the remote requesting party.  TPM can be revoked only if the DAA private key in extracted  Publishing of private key is necessary.  TPM cannot be revoked if private key is not sent to verifier
  • 3. Abstract…  A new Scheme can be developed called EPID( Enhances privacy scheme).  Provides Unlinkability in a more secure manner.  TPM can be revoked even if the Private key is unknown.  No need to distribute the private key.  Same security model as in DAA  More efficient in exception handling than the conventional DAA.
  • 4. Terminologies…  DAA : Direct Anonymous Attestation  TPM : Trusted Platform Module  EPID : Enhanced Privacy ID
  • 5. Existing System… o In DAA, an issuer creates group public key. o TPM obtains unique key from the issuer. o For authentication the TPM Generates a Signature. o The verifier verifies the generated signature. o If the TPM was found compromised, the private key is placed in the revocation list. o Verifier checks the signature against the Revocation list. o The appropriate result is issued.
  • 6. Proposed System…  EPID is developed.  Enhanced revocation capabilities.  Broader capability beyond attestation and TCG(trusted computation group).  Contains four Entities: • Issuer. • Revocation manager • User • Verifier  The issuer can be the same entity as the revocation manager.  The signatures must be:  Unforgeable .  Anonymous.  Unlinkable.
  • 7. Software Requirements…  Operating System - Windows XP  Platform - Visual Studio .NET 2008  Database - SQL Server 2005  Languages - Asp.Net , C#.Net
  • 8. Hardware Requirements…  Hard Disk - 20 GB  Monitor - 15’ Color with VGI card support  RAM - Minimum 1 GB  Processor - Pentium IV and Above (or) Equivalent  Processor Speed - Minimum 500 MHz speed
  • 9. Algorithm… EPID scheme consists of four procedures :  Setup : The issuer creates a group public key and a group issuing private key. The Issuer publishes the group public key.  Join : Protocol between the issuer and a user that results in the user becoming a new group member. At the end, the user obtains a membership private key from the issuer.
  • 10.  Proof of membership : A prover interacts with a verifier to convince the verifier that he is a member of the group by following ways-  The prover sends a request to the verifier.  The verifier responds with a message m.  The prover generates a signature on m based on his membership private key.  The verifier verifies the signature using the group public key.
  • 11.  Revocation : The revocation manager puts a group member into the revocation list. There are three types of revocations:  Private-key-based revocation in which the revocation manager revokes a user based on the user’s membership private key.  Signature based revocation in which the revocation manager revokes a user based on the signatures created by the user.  Issuer-based revocation in which the revocation manager revokes a user based on the recommendation from the issuer.