Understanding Position-Based Cryptography: Identity and Security π (Part 1/2)
Explore the fundamentals of position-based cryptography, focusing on how identities like social security numbers and biometric data play a role in securing digital communications. Dive into the core concepts in this introductory guide.

Microsoft Research
586 views β’ Sep 7, 2016

About this video
We consider what constitutes identities in cryptography. Typical examples include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) public-key coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a bank-teller behind a bullet-proof bank window not because she shows us her credentials but by merely knowing her location. In this paper, we initiate the study of cryptographic protocols where the identity (or other credentials and inputs) of a party are derived from its geographic location. We explore the possibility of Position
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
586
Likes
14
Duration
44:52
Published
Sep 7, 2016
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.