Introduction and survey

1958 Acta Radiologica  
This report is in two parts. In the first part I talk about Trusted Computing, while in the second part the focus is on pseudonymity. In today's world, security is of primary concern. Data of ever increasing value is being created and stored on PC's. At the same time, more and more vulnerabilities are being found in existing software . Till now, the main focus of security has been servers and networks, while clients have remained relatively unprotected. Also, most of the mechanisms in place for
more » ... anisms in place for client security are software based. It is increasingly being felt that client security should be given much more importance and that a purely software based mechanism is inadequate in providing the required level of security. It was with this in mind that people and organizations started exploring the idea of security through hardware enhancements and a whole new paradigm of Trusted Computing was born. The idea was to come up with appropriate hardware modifications that would help in providing security against software attacks on clients. Here, I will present the suggested enhancements and look at the proposed security mechanism. This technology is no longer on paper and companies such as Intel, IBM etc. have started selling PC's with some of the required enhancements. An important component of Trusted Computing is Attestation. This is the ability of a system to prove its security properties to a remote system. However, this immediately raises questions of privacy. Although we want to prove our credentials to a remote host, we do not want it to know any other identifying information about us. This leads us to the more general problem of protecting user privacy. Users want the ability to control the information that others know about them and also to be able to monitor and control its use. Currently, the way computers are used to carry out transactions, user privacy is being compromised since organisations and other users get to know much more information than what is necessary. We need anonymity in transactions. At the same time, we want to safeguard against malicious users who try to exploit the system. In this report, I will present a simple anonymous credential system proposed by Chaum [1]. A credential system is a system in which users can obtain credentials from some organizations and demonstrate their possession. It is said to be anonymous when no one (apart from maybe a few trusted third parties) can say whether two transactions are being carried out by the same user. I will conclude by presenting the basic mathematics underlying the anonymous credential system proposed by Camenisch and Lysyanskaya [2] that is actually used in the above security framework (Trusted Computing) for achieving anonymous attestation. Trusted Computing
doi:10.3109/00016925809171599 fatcat:7f3kc3bo3bcujfes6gu7u2jx7y