GM/T 0079-2020 PDF EnglishUS$555.00 · In stock · Download in 9 seconds
GM/T 0079-2020: Direct anonymous attestation specification for trusted computing platform Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure Status: Valid
Similar standardsGM/T 0079-2020: Direct anonymous attestation specification for trusted computing platform---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GMT0079-2020GM CRYPTOGRAPHIC INDUSTRY STANDARD ICS 35.040 CCS L 80 Direct anonymous attestation specification for trusted computing platform Issued on. DECEMBER 28, 2020 Implemented on. JULY 01, 2021 Issued by. National Cryptography Administration Table of ContentsForeword... 3 1 Scope... 4 2 Normative references... 4 3 Terms and definitions... 4 4 Symbols and abbreviations... 6 5 Cryptographic algorithm... 7 6 Direct anonymous attestation function... 8 7 Direct anonymous attestation interface... 15 Appendix A (Normative) Data structure of direct anonymous attestation interface... 32 Appendix B (Informative) Direct anonymous attestation of elliptic curve parameters and auxiliary functions... 37 References... 381 ScopeThis document specifies the functions, interfaces, data structure of the direct anonymous attestation protocol of the trusted computing platform. This document is applicable to the development of the direct anonymous certification protocol applications, anonymous certification services, anonymous certification systems of the trusted computing platform.2 Normative referencesThe provisions in following documents become the provisions of this Standard through reference in this Standard. For the dated references, the subsequent amendments (excluding corrections) or revisions do not apply to this Standard; however, parties who reach an agreement based on this Standard are encouraged to study if the latest versions of these documents are applicable. For undated references, the latest edition of the referenced document applies. GB/T 32918-2016 (all parts) Information security techniques - Elliptic curve public-key cryptography GM/T 0012 Trusted computing - Interface specification of trusted cryptography module GM/Z 4001 Cryptographic terms3 Terms and definitionsThe terms as defined in GM/Z 4001, as well as the following terms, apply to this document. 3.1 Trusted cryptography module; TCM A basic hardware module, which construct the trusted computing platform. It provides cryptographic computing functions for the trusted computing platform; has protected storage space. 3.2 Endorsement key; EK The key pair, which is used in the trusted cryptographic module, to identify its own identity. It can only be used for encryption and decryption. Depending on the context, this term may represent a key pair, the public key in a key pair, or the private key in a key pair. 3.3 TCM service module A software middleware of the trusted cryptographic module, that provides services to applications. 3.4 Direct anonymous attestation; DAA The anonymous identity authentication scheme, which is used by the trusted computing platform. 3.5 Elliptic curve-based direct anonymous attestation Direct anonymous attestation scheme, which is based on elliptic curve cryptography scheme.4 Symbols and abbreviations4.1 Symbols The cryptographic symbols which are defined in GB/T 32918-2016 (all parts), as well as the following cryptographic symbols, apply to this document. 0.Integer 0, bit 0, or finite field addition identity element.5 Cryptographic algorithmThis document adopts the cryptographic algorithm, which is approved by the national cryptographic management authority.6 Direct anonymous attestation function6.1 Overview The direct anonymous attestation is used for the anonymous identity attestation of the TCM security chip. 6.2 Model 6.2.1 System composition The ECDAA system is mainly composed of three participants. the issuer, the prover, the verifier, as shown in Figure 1.The prover is divided into the host and the TCM security chip, according to the ECDAA calculation location. The both cooperate to complete the anonymous credential application and anonymous certification process. 6.2.2 Basic process The main communication process between the various participants of the ECDAA system includes the following steps. 6.2.3 Security goals The main problem solved by the ECDAA system is how the trusted computing platform/TCM chip user can prove to the remote verifier, that its platform does use the trusted cryptographic module TCM, that is, how the TCM security chip authenticates itself. While authenticating the TCM identity, it is also necessary to protect the privacy of the platform's identity; it is required that the remote verifier cannot know the exact identity of the TCM security chip AND cannot link multiple TCM sessions. In order to meet the above security requirements, the ECDAA system needs to achieve the following security goals. 6.3.2 System initialization 2 This algorithm is used by the prover host and TCM to set the public parameters of the elliptic curve system, which is generated by the issuer (see Appendix B for details). Its input, output and algorithm flow are as follows. 6.3.5 Certificate issuance algorithm 3 This algorithm is used by the prover to store anonymous credentials; its input, output and algorithm flow are as follows.7 Direct anonymous attestation interface7.1 Overview The TCM security chip shall provide support for three anonymous certification commands. TCM_ECDAA_Setup, TCM_ECDAA_Join, TCM_ECDAA_Sign, 7.2 TCM_ECDAA_Setup command 7.2.1 Definition of interface input parameter The TCM_ECDAA_Setup command of the definition of interface input parameter can only be initiated by the TCM owner, to the security chip TCM. 7.2.3 Command processing flow 7.2.3.1 Process overview The execution of the TCM_ECDAA_Setup command is divided into several stages. 7.3.3 Command processing flow 7.3.3.1 Flow overview The execution of the TCM_ECDAA_Join command is divided into several stages. Table 6 regulates the detailed definition of the functions of each stage. The interface input handle parameter of stage 0 is the Setup command session handle; the output parameter contains the new Join session handle, instead of the original Setup session handle, which is used for the interface input handle parameters of stage 1 and stage 2.The session handle will be cleared at the end of stage 2. GM/T 0079-2020 GM CRYPTOGRAPHIC INDUSTRY STANDARD ICS 35.040 CCS L 80 Direct anonymous attestation specification for trusted computing platform Issued on. DECEMBER 28, 2020 Implemented on. JULY 01, 2021 Issued by. National Cryptography AdministrationTable of ContentsForeword... 3 1 Scope... 4 2 Normative references... 4 3 Terms and definitions... 4 4 Symbols and abbreviations... 6 5 Cryptographic algorithm... 7 6 Direct anonymous attestation function... 8 7 Direct anonymous attestation interface... 15 Appendix A (Normative) Data structure of direct anonymous attestation interface... 32 Appendix B (Informative) Direct anonymous attestation of elliptic curve parameters and auxiliary functions... 37 References... 381 ScopeThis document specifies the functions, interfaces, data structure of the direct anonymous attestation protocol of the trusted computing platform. This document is applicable to the development of the direct anonymous certification protocol applications, anonymous certification services, anonymous certification systems of the trusted computing platform.2 Normative referencesThe provisions in following documents become the provisions of this Standard through reference in this Standard. For the dated references, the subsequent amendments (excluding corrections) or revisions do not apply to this Standard; however, parties who reach an agreement based on this Standard are encouraged to study if the latest versions of these documents are applicable. For undated references, the latest edition of the referenced document applies. GB/T 32918-2016 (all parts) Information security techniques - Elliptic curve public-key cryptography GM/T 0012 Trusted computing - Interface specification of trusted cryptography module GM/Z 4001 Cryptographic terms3 Terms and definitionsThe terms as defined in GM/Z 4001, as well as the following terms, apply to this document. 3.1 Trusted cryptography module; TCM A basic hardware module, which construct the trusted computing platform. It provides cryptographic computing functions for the trusted computing platform; has protected storage space. 3.2 Endorsement key; EK The key pair, which is used in the trusted cryptographic module, to identify its own identity. It can only be used for encryption and decryption. Depending on the context, this term may represent a key pair, the public key in a key pair, or the private key in a key pair. 3.3 TCM service module A software middleware of the trusted cryptographic module, that provides services to applications. 3.4 Direct anonymous attestation; DAA The anonymous identity authentication scheme, which is used by the trusted computing platform. 3.5 Elliptic curve-based direct anonymous attestation Direct anonymous attestation scheme, which is based on elliptic curve cryptography scheme.4 Symbols and abbreviations4.1 Symbols The cryptographic symbols which are defined in GB/T 32918-2016 (all parts), as well as the following cryptographic symbols, apply to this document. 0.Integer 0, bit 0, or finite field addition identity element.5 Cryptographic algorithmThis document adopts the cryptographic algorithm, which is approved by the national cryptographic management authority.6 Direct anonymous attestation function6.1 Overview The direct anonymous attestation is used for the anonymous identity attestation of the TCM security chip. 6.2 Model 6.2.1 System composition The ECDAA system is mainly composed of three participants. the issuer, the prover, the verifier, as shown in Figure 1.The prover is divided into the host and the TCM security chip, according to the ECDAA calculation location. The both cooperate to complete the anonymous credential application and anonymous certification process. 6.2.2 Basic process The main communication process between the various participants of the ECDAA system includes the following steps. 6.2.3 Security goals The main problem solved by the ECDAA system is how the trusted computing platform/TCM chip user can prove to the remote verifier, that its platform does use the trusted cryptographic module TCM, that is, how the TCM security chip authenticates itself. While authenticating the TCM identity, it is also necessary to protect the privacy of the platform's identity; it is required that the remote verifier cannot know the exact identity of the TCM security chip AND cannot link multiple TCM sessions. In order to meet the above security requirements, the ECDAA system needs to achieve the following security goals. 6.3.2 System initialization 2 This algorithm is used by the prover host and TCM to set the public parameters of the elliptic curve system, which is generated by the issuer (see Appendix B for details). Its input, output and algorithm flow are as follows. 6.3.5 Certificate issuance algorithm 3 This algorithm is used by the prover to store anonymous credentials; its input, output and algorithm flow are as follows.7 Direct anonymous attestation interface7.1 Overview The TCM security chip shall provide support for three anonymous certification commands. TCM_ECDAA_Setup, TCM_ECDAA_Join, TCM_ECDAA_Sign, 7.2 TCM_ECDAA_Setup command 7.2.1 Definition of interface input parameter The TCM_ECDAA_Setup command of the definition of interface input parameter can only be initiated by the TCM owner, to the security chip TCM. 7.2.3 Command processing flow 7.2.3.1 Process overview The execution of the TCM_ECDAA_Setup command is divided into several stages. 7.3.3 Command processing flow 7.3.3.1 Flow overview The execution of the TCM_ECDAA_Join command is divided into several stages. Table 6 regulates the detailed definition of the functions of each stage. The interface input handle parameter of stage 0 is the Setup command session handle; the output parameter contains the new Join session handle, instead of the original Setup session handle, which is used for the interface input handle parameters of stage 1 and stage 2.The session handle will be cleared at the end of stage 2. ......Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al. Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of English version of GM/T 0079-2020 be delivered?Answer: The full copy PDF of English version of GM/T 0079-2020 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.Question 2: Can I share the purchased PDF of GM/T 0079-2020_English with my colleagues?Answer: Yes. The purchased PDF of GM/T 0079-2020_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GM/T 0079-2020 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.How to buy and download a true PDF of English version of GM/T 0079-2020?A step-by-step guide to download PDF of GM/T 0079-2020_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).Step 2: Search keyword "GM/T 0079-2020". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9 |