Nyman, Thomas ; Ekberg, Jan-Erik ; Asokan, N. (2014)
Citizen Electronic Identities using {TPM} 2.0.
Konferenzveröffentlichung, Bibliographie
Kurzbeschreibung (Abstract)
Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authen- ticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical se- curity access control. Typical eID tokens take the form of physical smart cards, but successes in merging eID into phone operator SIM cards show that eID tokens integrated into a personal device can offer better usability compared to standalone tokens. At the same time, trusted hardware that enables secure storage and isolated processing of sensi- tive data have become commonplace both on PC platforms as well as mobile devices. Some time ago, the Trusted Computing Group (TCG) released the version 2.0 of the Trusted Platform Module (TPM) specification. We propose an eID architecture based on the new, rich authorization model introduced in the TCGs TPM 2.0. The goal of the design is to improve the overall security and usability compared to traditional smart card-based solutions. We also provide, to the best our knowledge, the first accessible description of the TPM 2.0 authorization model.
Typ des Eintrags: | Konferenzveröffentlichung |
---|---|
Erschienen: | 2014 |
Autor(en): | Nyman, Thomas ; Ekberg, Jan-Erik ; Asokan, N. |
Art des Eintrags: | Bibliographie |
Titel: | Citizen Electronic Identities using {TPM} 2.0 |
Sprache: | Deutsch |
Publikationsjahr: | Juli 2014 |
Titel der Zeitschrift, Zeitung oder Schriftenreihe: | CoRR |
Buchtitel: | Proceedings of the 4th International Workshop on Trustworthy Embedded Devices |
Kurzbeschreibung (Abstract): | Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authen- ticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical se- curity access control. Typical eID tokens take the form of physical smart cards, but successes in merging eID into phone operator SIM cards show that eID tokens integrated into a personal device can offer better usability compared to standalone tokens. At the same time, trusted hardware that enables secure storage and isolated processing of sensi- tive data have become commonplace both on PC platforms as well as mobile devices. Some time ago, the Trusted Computing Group (TCG) released the version 2.0 of the Trusted Platform Module (TPM) specification. We propose an eID architecture based on the new, rich authorization model introduced in the TCGs TPM 2.0. The goal of the design is to improve the overall security and usability compared to traditional smart card-based solutions. We also provide, to the best our knowledge, the first accessible description of the TPM 2.0 authorization model. |
Freie Schlagworte: | ICRI-SC |
ID-Nummer: | TUD-CS-2014-1029 |
Fachbereich(e)/-gebiet(e): | Profilbereiche Profilbereiche > Cybersicherheit (CYSEC) |
Hinterlegungsdatum: | 31 Dez 2016 00:01 |
Letzte Änderung: | 08 Okt 2020 06:20 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |