Anonymous authentication is an important feature for trusted computing. Firstly, this paper describes two kinds of authentication model Trusted Computing Group (TCG) proposed -TTP model and DAA model, and then analyses their advantages and disadvantages. Secondly, the paper proposes an improved solution based on the elliptic curve algorithm (ECC) in the base of the original DAA model. Finally, the paper detailed ...