Privacy-Enhancing Cryptography: From Theory into Practice

  • Jan Camenisch
Conference paper

DOI: 10.1007/978-3-642-11799-2_29

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5978)
Cite this paper as:
Camenisch J. (2010) Privacy-Enhancing Cryptography: From Theory into Practice. In: Micciancio D. (eds) Theory of Cryptography. TCC 2010. Lecture Notes in Computer Science, vol 5978. Springer, Berlin, Heidelberg


We conduct an increasing part of our daily transactions electronically and thereby we leave an eternal electronic trail of personal data. We are almost never able to see what data about us we imprint, where it is processed or where it is stored. Indeed, controlling the dispersal of our data and protecting our privacy has become virtually impossible.

In this talk we will investigate the extent to which tools from cryptography and other technical means can help us to regain control of our data and to save our privacy. To this end, we will review the most important of the practical cryptographic mechanisms and discuss how they could be applied. In a second part, we will report on the readiness of the industry to indeed employ such technologies and on how governments address the current erosion of privacy.

Copyright information

© IFIP International Federation for Information Processing 2010

Authors and Affiliations

  • Jan Camenisch
    • 1
  1. 1.IBM ResearchZurichSwitzerland

Personalised recommendations