The above research gives out some preliminary test results of DAA schemes. In the future, we will make a more in-depth test, give out more efficient DAA optimization methods and define secure API for ECC-DAA schemes so as to provide a more scientific guideline for design and implementation of ECC-DAA systems.
7.3.3Research Prospects
In this section, we discuss the attestation of platform identity based on TPM/TCM. We introduce the principle and method of the attestation based on Privacy CA and focus on the model of DAA and some related research results. In the field of engineering, the currently most practical way to attest platform identity is based on the Privacy CA, which is built on the mature PKI certificate architecture. This method is ...
Get Trusted Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.