Exploiting TPM functionality 
Mark Ryan

Introduction
This work shows how the TPM can give us the "cryptographic equivalent" of an envelope.

Suppose Alice wants to give Bob some data d, with the following conditions:
  1. Bob can access the data at any time, without further interaction with Alice.
  2. But if he chooses not to access it, he can "return" it to Alice "unopened".
  3. After he has done that, Alice can be sure he can no longer access it.
The slides show that if Bob has a TPM, then he can offer this service. Alice can be sure that he cannot access the data d after he has "returned" it to her.
 

Slides

 

Results
Under construction. Feel free to email me for more details.