Position-based Cryptography [1/2]
Channel:
Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=GEUJ0OY54kw
We consider what constitutes identities in cryptography. Typical examples include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) public-key coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a bank-teller behind a bullet-proof bank window not because she shows us her credentials but by merely knowing her location. In this paper, we initiate the study of cryptographic protocols where the identity (or other credentials and inputs) of a party are derived from its geographic location. We explore the possibility of Position
Other Videos By Microsoft Research
Tags:
microsoft research