Rethinking public key infrastructures and digital certificates : building in privacy / Stefan A. Brands.
2000
TK5105.59 .B73 2000b
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Linked e-resources
Linked Resource
Details
Title
Rethinking public key infrastructures and digital certificates : building in privacy / Stefan A. Brands.
Author
Caption Title
Rethinking public key infrastructure and digital certificates
ISBN
9780262269131 (electronic bk.)
0262269139 (electronic bk.)
9780262024914
0262024918
0262269139 (electronic bk.)
9780262024914
0262024918
Publication Details
Cambridge, Mass. : MIT Press, ©2000.
Language
English
Description
1 online resource (xxi, 314 pages)
Call Number
TK5105.59 .B73 2000b
Dewey Decimal Classification
005.8
Summary
Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security.As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.
Note
Title from title screen.
Includes index.
Includes index.
Access Note
Access limited to authorized users.
Source of Description
OCLC-licensed vendor bibliographic record.
Record Appears in