The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion)
This talk is about how we go about composing privacy properties. This workshop is about protecting privacy, and authentication and privacy are not only functionally in conflict, they also use different kind of technical mechanisms. Now how do we “compose” cryptographic primitives? I’ve put “compose” in inverted commas because it is also used by the operating system guys to describe a separate bundle of issues. If you can come up with a better slogan for what’s going on here then I would very much like to hear it.
KeywordsSignature Scheme Parity Check Secret Sharing Scheme Erasure Code Cryptographic Primitive
Unable to display preview. Download preview PDF.