Position-based Cryptography [1/2]

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=GEUJ0OY54kw



Duration: 44:52
453 views
12


We consider what constitutes identities in cryptography. Typical examples include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) public-key coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a bank-teller behind a bullet-proof bank window not because she shows us her credentials but by merely knowing her location. In this paper, we initiate the study of cryptographic protocols where the identity (or other credentials and inputs) of a party are derived from its geographic location. We explore the possibility of Position




Other Videos By Microsoft Research


2016-09-07The History of Uranium
2016-09-072009 eScience: Software Support for Hybrid Computing
2016-09-072009 eScience: Computational Methods for Large Scale DNA Data Analysis
2016-09-072009 eScience: Tools for Scalable Genome Haplotying in the Windows Azure Cloud
2016-09-07Programmers and the Web: Understanding and Supporting DevelopersΓÇÖ Use of Online Resources
2016-09-07Economics Meets UI Design: Toll Bridge Pricing and P2P Backup Markets
2016-09-07Touch , Tabletop, and Tangible Blocks
2016-09-07Connected: The Surprising Power of Our Social Networks and How They Shape our Lives
2016-09-07Control Theory and Computing: An unconsummated union
2016-09-07Particle Packing Problems for Fun and Profit
2016-09-07Position-based Cryptography [1/2]
2016-09-07Improving diagramming software usability with automatic routing and placement tools
2016-09-07Enhancing Cloud SLA with Security: A secure, Searchable, and Practical Cloud Storage System
2016-09-07Contracting with Asymmetric Externalities
2016-09-07Elections and Strategic Voting: Condorcet and Borda
2016-09-07Building Systems That Enforce Measurable Security Goals
2016-09-07Conjunctive Grammars and Synchronized Alternating Pushdown Automata
2016-09-07Borrowing Brilliance: The Six Steps to Business Innovation by Building on the Ideas of Others
2016-09-07Automated reasoning in non-classical logics with the polarized inverse method
2016-09-07Where computer vision needs help from computer science
2016-09-07Parallel Programming with Chorus



Tags:
microsoft research