Show simple item record

dc.contributor.advisorSrini Devadas
dc.contributor.authorSarmenta, Luis F. G.
dc.contributor.authorvan Dijk, Marten
dc.contributor.authorO'Donnell, Charles W.
dc.contributor.authorRhodes, Jonathan
dc.contributor.authorDevadas, Srinivas
dc.contributor.otherComputation Structures
dc.date.accessioned2006-09-11T22:20:24Z
dc.date.available2006-09-11T22:20:24Z
dc.date.issued2006-09-11
dc.identifier.otherMIT-CSAIL-TR-2006-064
dc.identifier.urihttp://hdl.handle.net/1721.1/33966
dc.description.abstractA trusted monotonic counter is a valuable primitive thatenables a wide variety of highly scalable offlineand decentralized applications that would otherwise be prone to replay attacks, including offline payment, e-wallets, virtual trusted storage, and digital rights management (DRM).In this paper, we show how one can implement a very large number of virtual monotonic counters on an untrusted machine with a Trusted Platform Module (TPM) or similar device, without relying on a trusted OS. We first present a log-based scheme that can be implemented with the current version of the TPM (1.2) and used incertain applications.We then show how the addition of a few simple features tothe TPM makes it possible to implement a hash-tree-based schemethat not only offers improved performance and scalability compared to the log-based scheme, but also makes it possible to implement count-limited objects (or ``clobs'' for short) -- i.e., encrypted keys, data, and other objectsthat can only be used when an associated virtual monotonic counter is within a certain range.Such count-limited objects include n-time use keys, n-out-of-m data blobs,n-copy migratable objects, and other variants, which have many potential uses in digital rights management (DRM), digital cash, digital voting, itinerant computing,and other application areas.
dc.format.extent18 p.
dc.format.extent430350 bytes
dc.format.extent694048 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypeapplication/postscript
dc.language.isoen_US
dc.relation.ispartofseriesMassachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory
dc.subjecttrusted storage
dc.subjectkey delegation
dc.subjectstored-value
dc.subjecte-wallet
dc.subjectsmartcard
dc.subjectmemory integrity checking
dc.subjectcertified execution
dc.titleVirtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version)
dc.identifier.citationA shorter version of this paper will appear in the 1st ACM CCS Workshop on Scalable Trusted Computing (STC'06).


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record