GM/T 0079-2020 PDF English
US$555.00 · In stock · Download in 9 secondsGM/T 0079-2020: Direct anonymous attestation specification for trusted computing platform Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
| GM/T 0079-2020 | English | 555 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Direct anonymous attestation specification for trusted computing platform
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GM/T 0079-2020
GM/T 0079-2020: Direct anonymous attestation specification for trusted computing platform---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0079-2020
GM
CRYPTOGRAPHIC INDUSTRY STANDARD
ICS 35.040
CCS L 80
Direct anonymous attestation specification for trusted
computing platform
Issued on. DECEMBER 28, 2020
Implemented on. JULY 01, 2021
Issued by. National Cryptography Administration
Table of Contents
Foreword... 3
1 Scope... 4
2 Normative references... 4
3 Terms and definitions... 4
4 Symbols and abbreviations... 6
5 Cryptographic algorithm... 7
6 Direct anonymous attestation function... 8
7 Direct anonymous attestation interface... 15
Appendix A (Normative) Data structure of direct anonymous attestation
interface... 32
Appendix B (Informative) Direct anonymous attestation of elliptic curve
parameters and auxiliary functions... 37
References... 38
1 Scope
This document specifies the functions, interfaces, data structure of the direct
anonymous attestation protocol of the trusted computing platform.
This document is applicable to the development of the direct anonymous
certification protocol applications, anonymous certification services,
anonymous certification systems of the trusted computing platform.
2 Normative references
The provisions in following documents become the provisions of this Standard
through reference in this Standard. For the dated references, the subsequent
amendments (excluding corrections) or revisions do not apply to this Standard;
however, parties who reach an agreement based on this Standard are
encouraged to study if the latest versions of these documents are applicable.
For undated references, the latest edition of the referenced document applies.
GB/T 32918-2016 (all parts) Information security techniques - Elliptic curve
public-key cryptography
GM/T 0012 Trusted computing - Interface specification of trusted
cryptography module
GM/Z 4001 Cryptographic terms
3 Terms and definitions
The terms as defined in GM/Z 4001, as well as the following terms, apply to this
document.
3.1
Trusted cryptography module; TCM
A basic hardware module, which construct the trusted computing platform. It
provides cryptographic computing functions for the trusted computing
platform; has protected storage space.
3.2
Endorsement key; EK
The key pair, which is used in the trusted cryptographic module, to identify
its own identity. It can only be used for encryption and decryption. Depending
on the context, this term may represent a key pair, the public key in a key
pair, or the private key in a key pair.
3.3
TCM service module
A software middleware of the trusted cryptographic module, that provides
services to applications.
3.4
Direct anonymous attestation; DAA
The anonymous identity authentication scheme, which is used by the trusted
computing platform.
3.5
Elliptic curve-based direct anonymous attestation
Direct anonymous attestation scheme, which is based on elliptic curve
cryptography scheme.
4 Symbols and abbreviations
4.1 Symbols
The cryptographic symbols which are defined in GB/T 32918-2016 (all parts),
as well as the following cryptographic symbols, apply to this document.
0.Integer 0, bit 0, or finite field addition identity element.
5 Cryptographic algorithm
This document adopts the cryptographic algorithm, which is approved by the
national cryptographic management authority.
6 Direct anonymous attestation function
6.1 Overview
The direct anonymous attestation is used for the anonymous identity attestation
of the TCM security chip.
6.2 Model
6.2.1 System composition
The ECDAA system is mainly composed of three participants. the issuer, the
prover, the verifier, as shown in Figure 1.The prover is divided into the host and
the TCM security chip, according to the ECDAA calculation location. The both
cooperate to complete the anonymous credential application and anonymous
certification process.
6.2.2 Basic process
The main communication process between the various participants of the
ECDAA system includes the following steps.
6.2.3 Security goals
The main problem solved by the ECDAA system is how the trusted computing
platform/TCM chip user can prove to the remote verifier, that its platform does
use the trusted cryptographic module TCM, that is, how the TCM security chip
authenticates itself. While authenticating the TCM identity, it is also necessary
to protect the privacy of the platform's identity; it is required that the remote
verifier cannot know the exact identity of the TCM security chip AND cannot link
multiple TCM sessions. In order to meet the above security requirements, the
ECDAA system needs to achieve the following security goals.
6.3.2 System initialization 2
This algorithm is used by the prover host and TCM to set the public parameters
of the elliptic curve system, which is generated by the issuer (see Appendix B
for details). Its input, output and algorithm flow are as follows.
6.3.5 Certificate issuance algorithm 3
This algorithm is used by the prover to store anonymous credentials; its input,
output and algorithm flow are as follows.
7 Direct anonymous attestation interface
7.1 Overview
The TCM security chip shall provide support for three anonymous certification
commands. TCM_ECDAA_Setup, TCM_ECDAA_Join, TCM_ECDAA_Sign,
7.2 TCM_ECDAA_Setup command
7.2.1 Definition of interface input parameter
The TCM_ECDAA_Setup command of the definition of interface input
parameter can only be initiated by the TCM owner, to the security chip TCM.
7.2.3 Command processing flow
7.2.3.1 Process overview
The execution of the TCM_ECDAA_Setup command is divided into several
stages.
7.3.3 Command processing flow
7.3.3.1 Flow overview
The execution of the TCM_ECDAA_Join command is divided into several
stages. Table 6 regulates the detailed definition of the functions of each stage.
The interface input handle parameter of stage 0 is the Setup command session
handle; the output parameter contains the new Join session handle, instead of
the original Setup session handle, which is used for the interface input handle
parameters of stage 1 and stage 2.The session handle will be cleared at the
end of stage 2.
GM/T 0079-2020
GM
CRYPTOGRAPHIC INDUSTRY STANDARD
ICS 35.040
CCS L 80
Direct anonymous attestation specification for trusted
computing platform
Issued on. DECEMBER 28, 2020
Implemented on. JULY 01, 2021
Issued by. National Cryptography Administration
Table of Contents
Foreword... 3
1 Scope... 4
2 Normative references... 4
3 Terms and definitions... 4
4 Symbols and abbreviations... 6
5 Cryptographic algorithm... 7
6 Direct anonymous attestation function... 8
7 Direct anonymous attestation interface... 15
Appendix A (Normative) Data structure of direct anonymous attestation
interface... 32
Appendix B (Informative) Direct anonymous attestation of elliptic curve
parameters and auxiliary functions... 37
References... 38
1 Scope
This document specifies the functions, interfaces, data structure of the direct
anonymous attestation protocol of the trusted computing platform.
This document is applicable to the development of the direct anonymous
certification protocol applications, anonymous certification services,
anonymous certification systems of the trusted computing platform.
2 Normative references
The provisions in following documents become the provisions of this Standard
through reference in this Standard. For the dated references, the subsequent
amendments (excluding corrections) or revisions do not apply to this Standard;
however, parties who reach an agreement based on this Standard are
encouraged to study if the latest versions of these documents are applicable.
For undated references, the latest edition of the referenced document applies.
GB/T 32918-2016 (all parts) Information security techniques - Elliptic curve
public-key cryptography
GM/T 0012 Trusted computing - Interface specification of trusted
cryptography module
GM/Z 4001 Cryptographic terms
3 Terms and definitions
The terms as defined in GM/Z 4001, as well as the following terms, apply to this
document.
3.1
Trusted cryptography module; TCM
A basic hardware module, which construct the trusted computing platform. It
provides cryptographic computing functions for the trusted computing
platform; has protected storage space.
3.2
Endorsement key; EK
The key pair, which is used in the trusted cryptographic module, to identify
its own identity. It can only be used for encryption and decryption. Depending
on the context, this term may represent a key pair, the public key in a key
pair, or the private key in a key pair.
3.3
TCM service module
A software middleware of the trusted cryptographic module, that provides
services to applications.
3.4
Direct anonymous attestation; DAA
The anonymous identity authentication scheme, which is used by the trusted
computing platform.
3.5
Elliptic curve-based direct anonymous attestation
Direct anonymous attestation scheme, which is based on elliptic curve
cryptography scheme.
4 Symbols and abbreviations
4.1 Symbols
The cryptographic symbols which are defined in GB/T 32918-2016 (all parts),
as well as the following cryptographic symbols, apply to this document.
0.Integer 0, bit 0, or finite field addition identity element.
5 Cryptographic algorithm
This document adopts the cryptographic algorithm, which is approved by the
national cryptographic management authority.
6 Direct anonymous attestation function
6.1 Overview
The direct anonymous attestation is used for the anonymous identity attestation
of the TCM security chip.
6.2 Model
6.2.1 System composition
The ECDAA system is mainly composed of three participants. the issuer, the
prover, the verifier, as shown in Figure 1.The prover is divided into the host and
the TCM security chip, according to the ECDAA calculation location. The both
cooperate to complete the anonymous credential application and anonymous
certification process.
6.2.2 Basic process
The main communication process between the various participants of the
ECDAA system includes the following steps.
6.2.3 Security goals
The main problem solved by the ECDAA system is how the trusted computing
platform/TCM chip user can prove to the remote verifier, that its platform does
use the trusted cryptographic module TCM, that is, how the TCM security chip
authenticates itself. While authenticating the TCM identity, it is also necessary
to protect the privacy of the platform's identity; it is required that the remote
verifier cannot know the exact identity of the TCM security chip AND cannot link
multiple TCM sessions. In order to meet the above security requirements, the
ECDAA system needs to achieve the following security goals.
6.3.2 System initialization 2
This algorithm is used by the prover host and TCM to set the public parameters
of the elliptic curve system, which is generated by the issuer (see Appendix B
for details). Its input, output and algorithm flow are as follows.
6.3.5 Certificate issuance algorithm 3
This algorithm is used by the prover to store anonymous credentials; its input,
output and algorithm flow are as follows.
7 Direct anonymous attestation interface
7.1 Overview
The TCM security chip shall provide support for three anonymous certification
commands. TCM_ECDAA_Setup, TCM_ECDAA_Join, TCM_ECDAA_Sign,
7.2 TCM_ECDAA_Setup command
7.2.1 Definition of interface input parameter
The TCM_ECDAA_Setup command of the definition of interface input
parameter can only be initiated by the TCM owner, to the security chip TCM.
7.2.3 Command processing flow
7.2.3.1 Process overview
The execution of the TCM_ECDAA_Setup command is divided into several
stages.
7.3.3 Command processing flow
7.3.3.1 Flow overview
The execution of the TCM_ECDAA_Join command is divided into several
stages. Table 6 regulates the detailed definition of the functions of each stage.
The interface input handle parameter of stage 0 is the Setup command session
handle; the output parameter contains the new Join session handle, instead of
the original Setup session handle, which is used for the interface input handle
parameters of stage 1 and stage 2.The session handle will be cleared at the
end of stage 2.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GM/T 0079-2020 be delivered?Answer: The full copy PDF of English version of GM/T 0079-2020 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GM/T 0079-2020_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0079-2020_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0079-2020 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GM/T 0079-2020?A step-by-step guide to download PDF of GM/T 0079-2020_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GM/T 0079-2020". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|