Main Reference PaperEnhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities, IEEE Transactions on Dependable and Secure Computing, May/June 2012.
  • A new scheme is proposed called Enhanced Privacy ID (EPID) that addresses the limitations in the existing system. EPID scheme can be viewed as a new DAA scheme with enhanced revocation capabilities. With this enhanced revocation capability, the new scheme will have broader applicability beyond attestation and the TCG application

+ Description
  • A new scheme is proposed called Enhanced Privacy ID (EPID) that addresses the limitations in the existing system. EPID scheme can be viewed as a new DAA scheme with enhanced revocation capabilities. With this enhanced revocation capability, the new scheme will have broader applicability beyond attestation and the TCG application

  • To propose a new DAA scheme with enhanced revocation capabilities

  • To propose a protocol that must be unforgeable, i.e., only non revoked group members are able to generate valid signatures

  • To propose a protocol that must be anonymous, i.e., the verifier cannot identify the actual signer given a valid signature

+ Aim & Objectives
  • To propose a new DAA scheme with enhanced revocation capabilities

  • To propose a protocol that must be unforgeable, i.e., only non revoked group members are able to generate valid signatures

  • To propose a protocol that must be anonymous, i.e., the verifier cannot identify the actual signer given a valid signature

  • User secret information (K value) in the ID can be hacked by the attacker in many ways. To overcome this issue, hash value of the K value is stored in the database instead of storing it directly. When user executes the POM, user should provide the K value at that time,hash value of which is compared with the issuer database while checking for revoked user or not.

+ Contribution
  • User secret information (K value) in the ID can be hacked by the attacker in many ways. To overcome this issue, hash value of the K value is stored in the database instead of storing it directly. When user executes the POM, user should provide the K value at that time,hash value of which is compared with the issuer database while checking for revoked user or not.

  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE

+ Software Tools & Technologies
  • Java JDK 1.8, MySQL 5.5.40

  • Netbeans 8.0.1, J2SE

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.