Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version)

A trusted monotonic counter is a valuable primitive thatenables a wide variety of highly scalable offlineand decentralized applications that would otherwise be prone to replay attacks, including offline payment, e-wallets, virtual trusted storage, and digital rights management (DRM).In this paper, w...

Full description

Bibliographic Details
Main Authors: Sarmenta, Luis F. G., van Dijk, Marten, O'Donnell, Charles W., Rhodes, Jonathan, Devadas, Srinivas
Other Authors: Srini Devadas
Language:en_US
Published: 2006
Subjects:
Online Access:http://hdl.handle.net/1721.1/33966
_version_ 1811087210810703872
author Sarmenta, Luis F. G.
van Dijk, Marten
O'Donnell, Charles W.
Rhodes, Jonathan
Devadas, Srinivas
author2 Srini Devadas
author_facet Srini Devadas
Sarmenta, Luis F. G.
van Dijk, Marten
O'Donnell, Charles W.
Rhodes, Jonathan
Devadas, Srinivas
author_sort Sarmenta, Luis F. G.
collection MIT
description A trusted monotonic counter is a valuable primitive thatenables a wide variety of highly scalable offlineand decentralized applications that would otherwise be prone to replay attacks, including offline payment, e-wallets, virtual trusted storage, and digital rights management (DRM).In this paper, we show how one can implement a very large number of virtual monotonic counters on an untrusted machine with a Trusted Platform Module (TPM) or similar device, without relying on a trusted OS. We first present a log-based scheme that can be implemented with the current version of the TPM (1.2) and used incertain applications.We then show how the addition of a few simple features tothe TPM makes it possible to implement a hash-tree-based schemethat not only offers improved performance and scalability compared to the log-based scheme, but also makes it possible to implement count-limited objects (or ``clobs'' for short) -- i.e., encrypted keys, data, and other objectsthat can only be used when an associated virtual monotonic counter is within a certain range.Such count-limited objects include n-time use keys, n-out-of-m data blobs,n-copy migratable objects, and other variants, which have many potential uses in digital rights management (DRM), digital cash, digital voting, itinerant computing,and other application areas.
first_indexed 2024-09-23T13:41:50Z
id mit-1721.1/33966
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T13:41:50Z
publishDate 2006
record_format dspace
spelling mit-1721.1/339662019-04-11T06:23:45Z Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version) Sarmenta, Luis F. G. van Dijk, Marten O'Donnell, Charles W. Rhodes, Jonathan Devadas, Srinivas Srini Devadas Computation Structures trusted storage key delegation stored-value e-wallet smartcard memory integrity checking certified execution A trusted monotonic counter is a valuable primitive thatenables a wide variety of highly scalable offlineand decentralized applications that would otherwise be prone to replay attacks, including offline payment, e-wallets, virtual trusted storage, and digital rights management (DRM).In this paper, we show how one can implement a very large number of virtual monotonic counters on an untrusted machine with a Trusted Platform Module (TPM) or similar device, without relying on a trusted OS. We first present a log-based scheme that can be implemented with the current version of the TPM (1.2) and used incertain applications.We then show how the addition of a few simple features tothe TPM makes it possible to implement a hash-tree-based schemethat not only offers improved performance and scalability compared to the log-based scheme, but also makes it possible to implement count-limited objects (or ``clobs'' for short) -- i.e., encrypted keys, data, and other objectsthat can only be used when an associated virtual monotonic counter is within a certain range.Such count-limited objects include n-time use keys, n-out-of-m data blobs,n-copy migratable objects, and other variants, which have many potential uses in digital rights management (DRM), digital cash, digital voting, itinerant computing,and other application areas. 2006-09-11T22:20:24Z 2006-09-11T22:20:24Z 2006-09-11 MIT-CSAIL-TR-2006-064 http://hdl.handle.net/1721.1/33966 A shorter version of this paper will appear in the 1st ACM CCS Workshop on Scalable Trusted Computing (STC'06). en_US Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory 18 p. 430350 bytes 694048 bytes application/pdf application/postscript application/pdf application/postscript
spellingShingle trusted storage
key delegation
stored-value
e-wallet
smartcard
memory integrity checking
certified execution
Sarmenta, Luis F. G.
van Dijk, Marten
O'Donnell, Charles W.
Rhodes, Jonathan
Devadas, Srinivas
Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version)
title Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version)
title_full Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version)
title_fullStr Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version)
title_full_unstemmed Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version)
title_short Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version)
title_sort virtual monotonic counters and count limited objects using a tpm without a trusted os extended version
topic trusted storage
key delegation
stored-value
e-wallet
smartcard
memory integrity checking
certified execution
url http://hdl.handle.net/1721.1/33966
work_keys_str_mv AT sarmentaluisfg virtualmonotoniccountersandcountlimitedobjectsusingatpmwithoutatrustedosextendedversion
AT vandijkmarten virtualmonotoniccountersandcountlimitedobjectsusingatpmwithoutatrustedosextendedversion
AT odonnellcharlesw virtualmonotoniccountersandcountlimitedobjectsusingatpmwithoutatrustedosextendedversion
AT rhodesjonathan virtualmonotoniccountersandcountlimitedobjectsusingatpmwithoutatrustedosextendedversion
AT devadassrinivas virtualmonotoniccountersandcountlimitedobjectsusingatpmwithoutatrustedosextendedversion