{"author":[{"first_name":"David","full_name":"Bernhard, David","last_name":"Bernhard"},{"id":"46B4C3EE-F248-11E8-B48F-1D18A9856A87","first_name":"Georg","last_name":"Fuchsbauer","full_name":"Fuchsbauer, Georg"},{"first_name":"Essam","last_name":"Ghadafi","full_name":"Ghadafi, Essam"}],"main_file_link":[{"open_access":"1","url":"http://eprint.iacr.org/2012/475"}],"date_updated":"2020-08-11T10:09:44Z","date_created":"2018-12-11T11:56:37Z","language":[{"iso":"eng"}],"title":"Efficient signatures of knowledge and DAA in the standard model","citation":{"ieee":"D. Bernhard, G. Fuchsbauer, and E. Ghadafi, “Efficient signatures of knowledge and DAA in the standard model,” vol. 7954. Springer, pp. 518–533, 2013.","short":"D. Bernhard, G. Fuchsbauer, E. Ghadafi, 7954 (2013) 518–533.","ama":"Bernhard D, Fuchsbauer G, Ghadafi E. Efficient signatures of knowledge and DAA in the standard model. 2013;7954:518-533. doi:10.1007/978-3-642-38980-1_33","ista":"Bernhard D, Fuchsbauer G, Ghadafi E. 2013. Efficient signatures of knowledge and DAA in the standard model. 7954, 518–533.","chicago":"Bernhard, David, Georg Fuchsbauer, and Essam Ghadafi. “Efficient Signatures of Knowledge and DAA in the Standard Model.” Lecture Notes in Computer Science. Springer, 2013. https://doi.org/10.1007/978-3-642-38980-1_33.","mla":"Bernhard, David, et al. Efficient Signatures of Knowledge and DAA in the Standard Model. Vol. 7954, Springer, 2013, pp. 518–33, doi:10.1007/978-3-642-38980-1_33.","apa":"Bernhard, D., Fuchsbauer, G., & Ghadafi, E. (2013). Efficient signatures of knowledge and DAA in the standard model. Presented at the ACNS: Applied Cryptography and Network Security, Banff, AB, Canada: Springer. https://doi.org/10.1007/978-3-642-38980-1_33"},"abstract":[{"text":"Direct Anonymous Attestation (DAA) is one of the most complex cryptographic protocols deployed in practice. It allows an embedded secure processor known as a Trusted Platform Module (TPM) to attest to the configuration of its host computer without violating the owner’s privacy. DAA has been standardized by the Trusted Computing Group and ISO/IEC.\r\n\r\nThe security of the DAA standard and all existing schemes is analyzed in the random-oracle model. We provide the first constructions of DAA in the standard model, that is, without relying on random oracles. Our constructions use new building blocks, including the first efficient signatures of knowledge in the standard model, which have many applications beyond DAA.\r\n","lang":"eng"}],"date_published":"2013-06-01T00:00:00Z","oa_version":"Submitted Version","oa":1,"scopus_import":1,"quality_controlled":"1","doi":"10.1007/978-3-642-38980-1_33","intvolume":" 7954","volume":7954,"series_title":"Lecture Notes in Computer Science","_id":"2260","page":"518 - 533","department":[{"_id":"KrPi"}],"type":"conference","year":"2013","publist_id":"4686","publisher":"Springer","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","conference":{"start_date":"2013-06-25","location":"Banff, AB, Canada","name":"ACNS: Applied Cryptography and Network Security","end_date":"2013-06-28"},"publication_status":"published","status":"public","month":"06","alternative_title":["LNCS"],"day":"01"}