Privacy-Enhancing Cryptography: From Theory into Practice

  • Jan Camenisch
Conference paper

DOI: 10.1007/978-3-642-11799-2_29

Volume 5978 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Camenisch J. (2010) Privacy-Enhancing Cryptography: From Theory into Practice. In: Micciancio D. (eds) Theory of Cryptography. TCC 2010. Lecture Notes in Computer Science, vol 5978. Springer, Berlin, Heidelberg

Abstract

We conduct an increasing part of our daily transactions electronically and thereby we leave an eternal electronic trail of personal data. We are almost never able to see what data about us we imprint, where it is processed or where it is stored. Indeed, controlling the dispersal of our data and protecting our privacy has become virtually impossible.

In this talk we will investigate the extent to which tools from cryptography and other technical means can help us to regain control of our data and to save our privacy. To this end, we will review the most important of the practical cryptographic mechanisms and discuss how they could be applied. In a second part, we will report on the readiness of the industry to indeed employ such technologies and on how governments address the current erosion of privacy.

Download to read the full conference paper text

Copyright information

© IFIP International Federation for Information Processing 2010

Authors and Affiliations

  • Jan Camenisch
    • 1
  1. 1.IBM ResearchZurichSwitzerland