Understanding Position-Based Cryptography: Identity and Security 🔐 (Part 1/2)

Explore the fundamentals of position-based cryptography, focusing on how identities like social security numbers and biometric data play a role in securing digital communications. Dive into the core concepts in this introductory guide.

Microsoft Research586 views44:52

About this video

We consider what constitutes identities in cryptography. Typical examples include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) public-key coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a bank-teller behind a bullet-proof bank window not because she shows us her credentials but by merely knowing her location. In this paper, we initiate the study of cryptographic protocols where the identity (or other credentials and inputs) of a party are derived from its geographic location. We explore the possibility of Position

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.

Video Information

Views
586

Total views since publication

Likes
14

User likes and reactions

Duration
44:52

Video length

Published
Sep 7, 2016

Release date

Quality
sd

Video definition

Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Spain under the topic 'g'.

Share This Video

SOCIAL SHARE

Share this video with your friends and followers across all major social platforms including X (Twitter), Facebook, Youtube, Pinterest, VKontakte, and Odnoklassniki. Help spread the word about great content!