Understanding Position-Based Cryptography: Identity and Security πŸ” (Part 1/2)

Explore the fundamentals of position-based cryptography, focusing on how identities like social security numbers and biometric data play a role in securing digital communications. Dive into the core concepts in this introductory guide.

Understanding Position-Based Cryptography: Identity and Security πŸ” (Part 1/2)
Microsoft Research
586 views β€’ Sep 7, 2016
Understanding Position-Based Cryptography: Identity and Security πŸ” (Part 1/2)

About this video

We consider what constitutes identities in cryptography. Typical examples include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) public-key coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a bank-teller behind a bullet-proof bank window not because she shows us her credentials but by merely knowing her location. In this paper, we initiate the study of cryptographic protocols where the identity (or other credentials and inputs) of a party are derived from its geographic location. We explore the possibility of Position

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

586

Likes

14

Duration

44:52

Published

Sep 7, 2016

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.