Infrastructure Work Group Subject Key Attestation Evidence Extension


As the transition to trusted computing implementations occur, participating entities have the need to verify the security properties and associated integrity of keys which are used to authorize and authenticate participants in multi-party transactions. It is also desirable to create this assertion in a manner which seamlessly integrates into existing infrastructures.