{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T14:19:11Z","timestamp":1772547551437,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["779391"],"award-info":[{"award-number":["779391"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N028295\/1"],"award-info":[{"award-number":["EP\/N028295\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3372197","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"784-798","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme"],"prefix":"10.1145","author":[{"given":"Stephan","family":"Wesemeyer","sequence":"first","affiliation":[{"name":"University of Surrey, Guildford, United Kingdom"}]},{"given":"Christopher J.P.","family":"Newton","sequence":"additional","affiliation":[{"name":"University of Surrey, Guildford, United Kingdom"}]},{"given":"Helen","family":"Treharne","sequence":"additional","affiliation":[{"name":"University of Surrey, Guildford, United Kingdom"}]},{"given":"Liqun","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Surrey, Guildford, United Kingdom"}]},{"given":"Ralf","family":"Sasse","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Jorden","family":"Whitefield","sequence":"additional","affiliation":[{"name":"Ericsson AB, Helsinki, Finland"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"A TPM Diffie-Hellman Oracle. IACR Cryptology ePrint Archive2013","author":"Acar Tolga","year":"2013"},{"key":"e_1_3_2_2_2_1","article-title":"Updating Key Size Estimations for Pairings","author":"Barbulescu Razvan","year":"2018","journal-title":"Journal of Cryptology(29"},{"key":"e_1_3_2_2_3_1","volume-title":"Easy Crypt: A Tutorial. In Foundations of Security Analysis and Design VII - FOSAD 2012\/2013 Tutorial Lectures. 146--166. https:\/\/doi.org\/10.1007\/978--3--319--10082--1_6","author":"Barthe Gilles","year":"2013"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813662"},{"key":"e_1_3_2_2_5_1","volume-title":"Cryptoverif: Computationally sound mechanized prover for cryptographic protocols. In Dagstuhl seminar 'Formal Protocol Verification Applied","author":"Blanchet Bruno","year":"2007"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"e_1_3_2_2_7_1","volume-title":"First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11--12, 2008, Proceedings. 166--178","author":"Brickell Ernie","year":"2008"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0076-3"},{"key":"e_1_3_2_2_9_1","volume-title":"Trusted Systems - Third International Conference, INTRUST 2011","author":"Brickell Ernie","year":"2011"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.63"},{"key":"e_1_3_2_2_11_1","volume-title":"Gallant","author":"Brown Daniel R. L.","year":"2004"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.22"},{"key":"e_1_3_2_2_13_1","volume-title":"Public Key Cryptography (2) (Lecture Notes in Computer Science)","author":"Camenisch Jan"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1950111.1950145"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Lily Chen. 2009.Recommendation for Key Derivation Using Pseudorandom Functions. SP 800--108. National Institute for Standards and Technology.  Lily Chen. 2009.Recommendation for Key Derivation Using Pseudorandom Functions. SP 800--108. National Institute for Standards and Technology.","DOI":"10.6028\/NIST.SP.800-108"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516729"},{"key":"e_1_3_2_2_17_1","volume-title":"Smart","author":"Chen Liqun","year":"2009"},{"key":"e_1_3_2_2_18_1","unstructured":"Liqun Chen Chris Newton Ralf Sasse Helen Treharne Stephan Wesemyer and Jorden Whitefield. 2020. Ecc-Daa C++ Implementation. GitHub. https:\/\/github.com\/UoS-SCCS\/ecc-daa.  Liqun Chen Chris Newton Ralf Sasse Helen Treharne Stephan Wesemyer and Jorden Whitefield. 2020. Ecc-Daa C++ Implementation. GitHub. https:\/\/github.com\/UoS-SCCS\/ecc-daa."},{"key":"e_1_3_2_2_19_1","unstructured":"Liqun Chen Chris Newton Ralf Sasse Helen Treharne Stephan Wesemyer and Jorden Whitefield. 2020. Ecc-Daa Tamarin models. GitHub. https:\/\/github.com\/tamarin-prover\/tamarin-prover\/tree\/develop\/examples\/asiaccs20-eccDAA.  Liqun Chen Chris Newton Ralf Sasse Helen Treharne Stephan Wesemyer and Jorden Whitefield. 2020. Ecc-Daa Tamarin models. GitHub. https:\/\/github.com\/tamarin-prover\/tamarin-prover\/tree\/develop\/examples\/asiaccs20-eccDAA."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110310"},{"key":"e_1_3_2_2_21_1","volume-title":"Smart","author":"Chen Liqun","year":"2010"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_2_23_1","unstructured":"Free Software Foundation Inc. 2019. GCC the GNU Compiler Collection. https:\/\/gcc.gnu.org [Online; accessed 12-June-2019].  Free Software Foundation Inc. 2019. GCC the GNU Compiler Collection. https:\/\/gcc.gnu.org [Online; accessed 12-June-2019]."},{"key":"e_1_3_2_2_24_1","volume-title":"Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module (EU H2020 Project, Grant Agreement No.779391)","author":"TPM.","year":"2018"},{"key":"e_1_3_2_2_25_1","unstructured":"Infineon Technologies AG. 2017. Iridium SLB 9670 TPM2.0 Linux.https:\/\/www.infineon.com\/cms\/en\/product\/evaluation-boards\/iridium9670-tpm2.0-linux\/ [Online accessed 03-May-2019].  Infineon Technologies AG. 2017. Iridium SLB 9670 TPM2.0 Linux.https:\/\/www.infineon.com\/cms\/en\/product\/evaluation-boards\/iridium9670-tpm2.0-linux\/ [Online accessed 03-May-2019]."},{"key":"e_1_3_2_2_26_1","unstructured":"International Business Machines. 2017. IBM's Software TPM 2.0 Version 1119. https:\/\/sourceforge.net\/projects\/ibmswtpm2 [Online accessed 03-May-2019].  International Business Machines. 2017. IBM's Software TPM 2.0 Version 1119. https:\/\/sourceforge.net\/projects\/ibmswtpm2 [Online accessed 03-May-2019]."},{"key":"e_1_3_2_2_27_1","unstructured":"International Business Machines. 2017. IBM's TPM 2.0 TSS Version 1119. https:\/\/sourceforge.net\/projects\/ibmtpm20tss\/ [Online accessed 03-May-2019].  International Business Machines. 2017. IBM's TPM 2.0 TSS Version 1119. https:\/\/sourceforge.net\/projects\/ibmtpm20tss\/ [Online accessed 03-May-2019]."},{"key":"e_1_3_2_2_28_1","volume-title":"Mechanisms based on weak secrets. Standard","author":"IEC"},{"key":"e_1_3_2_2_29_1","volume-title":"Mechanisms using a group public key. Standard","author":"al Signatures IEC"},{"issue":"1","key":"e_1_3_2_2_30_1","first-page":"3447","article-title":"Public-Key Cryptography Standards (PKCS)#1","volume":"2","author":"Jonsson Jakob","year":"2003","journal-title":"RSA Cryptography Specifications Version"},{"key":"e_1_3_2_2_32_1","unstructured":"Rolf Lindemann Jan Camenisch Manu Drijvers Alec Edgington Anja Lehmann and Rainer Urian. 2017. FIDO ECDAA Algorithm. https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-id-20170202\/fido-ecdaa-algorithm-v1.1-id-20170202.html  Rolf Lindemann Jan Camenisch Manu Drijvers Alec Edgington Anja Lehmann and Rainer Urian. 2017. FIDO ECDAA Algorithm. https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-id-20170202\/fido-ecdaa-algorithm-v1.1-id-20170202.html"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596782"},{"key":"e_1_3_2_2_34_1","unstructured":"Noah Robert Luther. 2017.Implementing Direct Anonymous Attestation on TPM 2.0.Master's thesis. Virginia Tech. https:\/\/vtechworks.lib.vt.edu\/handle\/10919\/86349  Noah Robert Luther. 2017.Implementing Direct Anonymous Attestation on TPM 2.0.Master's thesis. Virginia Tech. https:\/\/vtechworks.lib.vt.edu\/handle\/10919\/86349"},{"key":"e_1_3_2_2_35_1","volume-title":"CAV 2013, Saint Petersburg, Russia, July 13--19, 2013. Proceedings. 696--701","author":"Meier Simon"},{"key":"e_1_3_2_2_36_1","unstructured":"OpenSSL. 2017. OpenSSL Cryptography and SSL\/TLS toolkit. https:\/\/www.openssl.org\/ [Online accessed 03-May-2019].  OpenSSL. 2017. OpenSSL Cryptography and SSL\/TLS toolkit. https:\/\/www.openssl.org\/ [Online accessed 03-May-2019]."},{"issue":"0","key":"e_1_3_2_2_37_1","first-page":"2","article-title":"EK Credential Profile","volume":"2","author":"TCG.","year":"2014","journal-title":"For TPM Family"},{"key":"e_1_3_2_2_38_1","article-title":"Trusted Platform Module 2.0 Library","author":"TCG.","year":"2016","journal-title":"Specification. Rev. Trusted Computing Group. https:\/\/trustedcomputinggroup.org\/resource\/tpm-library-specification\/"},{"key":"e_1_3_2_2_39_1","first-page":"38","article-title":"Trusted Platform Module 2.0","volume":"1","author":"TCG.","year":"2016","journal-title":"Part 1: Architecture. Rev"},{"key":"e_1_3_2_2_40_1","first-page":"38","article-title":"Trusted Platform Module 2.0","volume":"1","author":"TCG.","year":"2016","journal-title":"Part 2: Structures. Rev"},{"key":"e_1_3_2_2_41_1","unstructured":"The Tamarin Team. 2016. Tamarin prover manual. https:\/\/tamarin-prover.github.io\/manual\/tex\/tamarin-manual.pdf [Online: accessed 09-April-2019].  The Tamarin Team. 2016. Tamarin prover manual. https:\/\/tamarin-prover.github.io\/manual\/tex\/tamarin-manual.pdf [Online: accessed 09-April-2019]."},{"key":"e_1_3_2_2_42_1","unstructured":"The Apache Software Foundation. 2019. The Apache Milagro Cryptographic Library. https:\/\/github.com\/apache\/incubator-milagro-crypto\/ [Online accessed03-May-2019].  The Apache Software Foundation. 2019. The Apache Milagro Cryptographic Library. https:\/\/github.com\/apache\/incubator-milagro-crypto\/ [Online accessed03-May-2019]."},{"key":"e_1_3_2_2_43_1","unstructured":"The Trusted Computing Group. 2016. TPM 2.0 Library Specification. https:\/\/trustedcomputinggroup.org\/resource\/tpm-library-specification\/ [Online accessed 11-April-2019].  The Trusted Computing Group. 2016. TPM 2.0 Library Specification. https:\/\/trustedcomputinggroup.org\/resource\/tpm-library-specification\/ [Online accessed 11-April-2019]."},{"key":"e_1_3_2_2_44_1","volume-title":"Trusted Computing. https:\/\/trustedcomputinggroup.org\/trusted-computing\/ [Online","author":"Trusted Computing Group","year":"2018"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2017.8275615"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00019"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"ASIA CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3372197","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3372197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:52Z","timestamp":1750273492000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3372197"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":45,"alternative-id":["10.1145\/3320269.3372197","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3372197","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}