Advertisement

Cryptographic Mechanisms for Privacy

  • Jan CamenischEmail author
  • Maria Dubovitskaya
  • Markulf Kohlweiss
  • Jorn Lapon
  • Gregory Neven
Chapter

Abstract

With the increasing use of electronic media for our daily transactions, we widely distribute our personal information. Once released, controlling the dispersal of this information is virtually impossible. Privacy-enhancing technologies can help to minimise the amount of information that needs to be revealed in transactions, on the one hand, and to limit the dispersal, on the other hand. Unfortunately, these technologies are hardly used today. In this paper, we aim to foster the adoption of such technologies by providing a summary of what they can achieve. We hope that by this, policy makers, system architects, and security practitioners will be able to employ privacy-enhancing technologies.

Keywords

Smart Card Signature Scheme Blind Signature Trusted Third Party Access Control Policy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Jan Camenisch
    • 1
    Email author
  • Maria Dubovitskaya
    • 1
  • Markulf Kohlweiss
    • 2
  • Jorn Lapon
    • 2
  • Gregory Neven
    • 1
  1. 1.IBM Research – ZurichRüschlikonSwitzerland
  2. 2.Katholieke Universiteit Leuven, ESAT - COSICLeuvenBelgium

Personalised recommendations