The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion)

  • Ross Anderson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3957)


This talk is about how we go about composing privacy properties. This workshop is about protecting privacy, and authentication and privacy are not only functionally in conflict, they also use different kind of technical mechanisms. Now how do we “compose” cryptographic primitives? I’ve put “compose” in inverted commas because it is also used by the operating system guys to describe a separate bundle of issues. If you can come up with a better slogan for what’s going on here then I would very much like to hear it.


Signature Scheme Parity Check Secret Sharing Scheme Erasure Code Cryptographic Primitive 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Ross Anderson
    • 1
  1. 1.Cambridge UniversityUK

Personalised recommendations