{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:14:28Z","timestamp":1725869668997},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319490991"},{"type":"electronic","value":"9783319491004"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49100-4_6","type":"book-chapter","created":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T10:41:42Z","timestamp":1477996902000},"page":"141-159","source":"Crossref","is-referenced-by-count":2,"title":["Algorithm Agility \u2013 Discussion on TPM 2.0 ECC Functionalities"],"prefix":"10.1007","author":[{"given":"Liqun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Rainer","family":"Urian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,2]]},"reference":[{"key":"6_CR1","unstructured":"ISO\/IEC 11889:2009 (all parts) Information technology - Trusted platform module"},{"key":"6_CR2","unstructured":"ISO\/IEC 11889:2015 (all parts) Information technology - Trusted platform module library"},{"key":"6_CR3","unstructured":"ISO\/ IEC 14888\u20133:2016 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms"},{"key":"6_CR4","unstructured":"ISO\/IEC 18033\u20132:2006 Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers"},{"key":"6_CR5","unstructured":"ISO\/IEC 18033\u20132, amd1 Encryption algorithms - Part 2: Asymmetric ciphers - Amendment 1"},{"key":"6_CR6","unstructured":"ISO\/IEC 20008\u20132:2013 Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key"},{"key":"6_CR7","unstructured":"Abdalla, M., Bellare, M., Rogaway, P.: DHAES: an encryption scheme based on the Diffie-Hellman problem. Cryptology ePrint Archive, Report 1999\/007 (1999). http:\/\/eprint.iacr.org"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-45353-9_12","volume-title":"Topics in Cryptology\u2014CT-RSA 2001","author":"M Abdalla","year":"2001","unstructured":"Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie-Hellman assumptions and an analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 143\u2013158. Springer, Heidelberg (2001). doi: 10.1007\/3-540-45353-9_12"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-24676-3_4","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56\u201373. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24676-3_4"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 132\u2013145. ACM Press (2004)","DOI":"10.1145\/1030083.1030103"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-642-13869-0_12","volume-title":"Trust and Trustworthy Computing","author":"E Brickell","year":"2010","unstructured":"Brickell, E., Li, J.: A pairing-based DAA scheme further reducing TPM resources. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) Trust 2010. LNCS, vol. 6101, pp. 181\u2013195. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13869-0_12"},{"key":"6_CR12","unstructured":"BSI: Technical Guideline TR-03111, Elliptic Curve Cryptography, v2.0. BSI (2012). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/TechGuidelines\/TR03111\/BSI-TR-03111_pdf.html"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-662-49387-8_10","volume-title":"Public-Key Cryptography\u2013PKC 2016","author":"J Camenisch","year":"2016","unstructured":"Camenisch, J., Drijvers, M., Lehmann, A.: Universally composable direct anonymous attestation. In: Cheng, C.-M., Chung, K.-M., Persiano, G., Yang, B.-Y. (eds.) PKC 2016. LNCS, vol. 9615, pp. 234\u2013264. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-49387-8_10"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-28628-8_4","volume-title":"Advances in Cryptology\u2013CRYPTO 2004","author":"J Camenisch","year":"2004","unstructured":"Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56\u201372. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-28628-8_4"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-30065-3_8","volume-title":"Trustworthy Global Computing","author":"L Chen","year":"2012","unstructured":"Chen, L., Lee, M.-F., Warinschi, B.: Security of the enhanced TCG privacy-CA solution. In: Bruni, R., Sassone, V. (eds.) TGC 2011. LNCS, vol. 7173, pp. 121\u2013141. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-30065-3_8"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Chen, L., Li, J.: Flexible and scalable digital signatures in TPM 2.0. In: Proceedings of the 2013 ACM Conference on Computer and Communications Security, pp. 37\u201348. ACM Press (2013)","DOI":"10.1145\/2508859.2516729"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-12510-2_16","volume-title":"Smart Card Research and Advanced Application","author":"L Chen","year":"2010","unstructured":"Chen, L., Page, D., Smart, N.P.: On the design and implementation of an efficient DAA scheme. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 223\u2013237. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-12510-2_16"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-319-22846-4_14","volume-title":"Trust and Trustworthy Computing","author":"L Chen","year":"2015","unstructured":"Chen, L., Urian, R.: DAA-A: direct anonymous attestation with attributes. In: Conti, M., Schunter, M., Askoxylakis, I. (eds.) Trust 2015. LNCS, vol. 9229, pp. 228\u2013245. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-22846-4_14"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Chen, L., Warinschi, B.: Security of the TCG privacy-CA solution. In: Proceedings of the 6th IEEE\/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010), pp. 609\u2013616. IEEE Press (2010)","DOI":"10.1109\/EUC.2010.98"},{"key":"6_CR20","unstructured":"Cramer, R., Shoup, V.: Design, analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. Cryptology ePrint Archive, Report 2001\/108 (2001). http:\/\/eprint.iacr.org"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology\u2014CRYPTO \u201998","author":"R Cramer","year":"1998","unstructured":"Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13\u201325. Springer, Heidelberg (1998). doi: 10.1007\/BFb0055717"},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology\u2014CRYPTO \u201999","author":"E Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537\u2013554. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48405-1_34"},{"key":"6_CR23","unstructured":"Gallagher, P.: Deputy Director Foreword, Cita Furlani Director: Fips pub 186\u20133 federal information processing standards publication digital signature standard (dss) (2009)"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-319-06734-6_4","volume-title":"Progress in Cryptology\u2013AFRICACRYPT 2014","author":"K Kurosawa","year":"2014","unstructured":"Kurosawa, K., Trieu Phong, L.: Kurosawa-Desmedt key encapsulation mechanism, revisited. In: Pointcheval, D., Vergnaud, D. (eds.) AFRICACRYPT 2014. LNCS, vol. 8469, pp. 51\u201368. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-06734-6_4"},{"key":"6_CR25","unstructured":"Microsoft U-Prove Community Technology: U-Prove cryptographic specification version 1.1 (2013). http:\/\/www.microsoft.com\/u-prove"},{"key":"6_CR26","unstructured":"National Institute of Standards and Technology: Recommendation for pair-wise key estabishment schemes using discrete logarithm cryptography. Special Publication 800-56A, March 2007"},{"key":"6_CR27","unstructured":"Chinese National Standards: Public key cryptographic algorithm SM2 based on elliptic curves - Part 2: digital signature algorithm"},{"key":"6_CR28","unstructured":"TCG: TCG algorithm registry. Committee Draft, 7 January 2016"},{"key":"6_CR29","unstructured":"Trusted Computing Group: TCG TPM specification 1.2 (2003). www.trustedcomputinggroup.org"},{"key":"6_CR30","unstructured":"Trusted Computing Group: TCG TPM library 2.0 (2014). http:\/\/www.trustedcomputinggroup.org\/tpm-library-specification\/"},{"key":"6_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/11535218_2","volume-title":"Advances in Cryptology\u2013CRYPTO 2005","author":"X Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17\u201336. Springer, Heidelberg (2005). doi: 10.1007\/11535218_2"},{"key":"6_CR32","unstructured":"Wooten, D.: Final schnorr algorithm (2016). (email to TCG TPMWG)"},{"key":"6_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-08593-7_1","volume-title":"Trust and Trustworthy Computing","author":"L Xi","year":"2014","unstructured":"Xi, L., Yang, K., Zhang, Z., Feng, D.: DAA-related APIs in TPM 2.0 revisited. In: Holz, T., Ioannidis, S. (eds.) Trust 2014. LNCS, vol. 8564, pp. 1\u201318. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-08593-7_1"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49100-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T22:31:37Z","timestamp":1498343497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49100-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319490991","9783319491004"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49100-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}