Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy (Stefan Brands)

 
0.0 (0)
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy (Stefan Brands)

Traditional forms of security, such photos and handwritten signatures, are outmoded as paper-based communication and transaction processes are supplanted by automated ones.

Digital certificates, in the opinion of the majority of security professionals, are the greatest technology for protecting electronic communications. They will eventually be incorporated into every device or piece of software that needs to be able to connect securely. They are now widely used for authenticating and encrypting email and applications.

However, there is a significant issue with this inevitable trend: unless significant action is taken, everyone will be forced to communicate using the most pervasive electronic monitoring device ever created. There will also be numerous opportunities for hackers, dishonest employees, government organizations, financial institutions, insurance firms, and others to misuse digital certificates.

Stefan Brands offers cryptographic building blocks for the creation of digital certificates in this book that protect privacy without compromising security. Similar to movie tickets or subway tokens, these certificates serve the same purpose: anyone may verify their validity and the information they contain, but nothing else. Furthermore, it is impossible to link distinct behaviors by the same person.

Owners of certificates can decide to whom and to what extent information is disseminated. Combining subsets of the suggested cryptographic building elements enables a cookbook approach to design public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.

Ebook Details

Author(s)
About the Authors
Stefan A. Brands is a Distinguished Scientist at Zero-Knowledge Systems, Inc., Montreal, Canada.
Publisher
Published
Published Date / Year
1st edition (August 28, 2000)
Hardcover
356 pages
eBook Format
Online, PDF files
Language
English
ISBN-10
0262024918
ISBN-13
978-0262024914

Similar Programming & Computer Books

Learn Ethical Hacking from Scratch (Zaid Sabih)
The fundamentals of ethical hacking, how to hack safely and legally, how to install Kali Linux and use the Linux terminal are covered at the beginning of this book....
Watermarking - Volume 2 (Mithun Das Gupta)
The books in this collection contain some of the most recent advancements in the watermarking industry. To make this work a significant contribution to science, authors with various backgrounds...
Watermarking - Volume 1 (Mithun Das Gupta)
Some of the most recent advancements in the watermarking discipline are presented in this collection of books. To make this book a significant contribution to scientific study, authors from...
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks (Christian Rathgeb, et al)
The first thorough compilation of research on the popular subject of digital face alteration, including DeepFakes, Face Morphing, and Reenactment, is offered in this open access book. ...
Hacking Exposed Computer Forensics (Aaron Philipp, et al)
With the aid of this fully updated, practical guide, you can identify and look into computer thieves of all shades.
Bayes Factors for Forensic Decision Analyses with R (Silvia Bozza, et al)
With the help of the R programming language, this book offers a self-contained introduction to computational Bayesian statistics. This free programming book, which primarily focuses on Bayes factors supported...
Multimedia Forensics (Husrev Taha Sencar, et al)
The field of media forensics has never been more important to modern society. Media content not only makes up an ever-growing portion of the data that is transmitted over...
Handbook of Forensic Science (FBI)
The modern crime laboratory works daily to develop new methods for utilizing cutting-edge scientific and technology advancements to help the on-the-scene investigator solve crimes.
Learn Ethereum: Build your own Decentralized Applications with Ethereum and Smart Contracts (Xun Wu, et al)
Ethereum is a decentralized, blockchain-based computing platform that enables the execution of smart contracts.
Blockchain for Dummies, 2nd IBM Limited Edition (Manav Gupta)
Some of the largest industries in the world are being upended by blockchain technology. This free programming book offers a simple method to brush up on the fundamentals of...

Others Programming Books by The MIT Press

Cellular: An Economic and Business History of the International Mobile-Phone Industry (Daniel D. Garcia-Swartz, et al)
From the late 1970s to the present, charts the development of the global cellular industry. It took exceptional collaboration between businesses, governments, and industrial sectors for the mobile phone...
The Ecology of Games: Connecting Youth, Games, and Learning (Katie Salen)
Little has been published on an overall "ecology" of gaming, game design, and play - mapping the ways that all the various elements, from code to social practices to...
Categories, Types, and Structures: An Introduction to Category Theory for the Working Computer Scientist (Andrea Asperti, et al)
This free programming book offers an accessible introduction to category theory for computer scientists as well as useful examples in the context of programming language design. In "Categories, Types...
Sheaf Theory through Examples (Daniel Rosiak)
This free programming book offers a clear introduction to elementary sheaf theory from the standpoint of applied category theory and explores several applications, such as n-colorings of graphs, satellite...
Wandering Games (Melissa Kagen)
Games may use wandering as a topic, formal style, metaphor for aesthetics, or player action. It can refer to moving forward, moving backward, traveling, meandering, or escaping. ...
Probabilistic Machine Learning: Advanced Topics (Kevin Patrick Murphy)
In this book, we broaden the use of machine learning to more difficult issues.
Introduction to Online Convex Optimization (Elad Hazan)
In this book, optimization is portrayed as a procedure. It is not realistic to draw out a thorough theoretical model and utilize traditional algorithmic theory and/or mathematical optimization in...
Statistical Mechanics of Lattice Systems: A Concrete Mathematical Introduction (Sacha Friedli, et al)
Using a variety of specific models, such as the Curie-Weiss and Ising models, the Gaussian free field, O(n) models, and models with Ka interactions, this inspiring textbook provides a...
Software Design for Flexibility: How to Avoid Programming Yourself into a Corner (Chris Hanson, et al)
Techniques for designing huge systems that are easily reconfigurable for different scenarios with very modest programming changes.
Global Fintech: Financial Innovation in the Connected World (David L. Shrier, et al.)
The global financial services industry has been completely transformed by artificial intelligence, big data, blockchain, and other new technologies, opening up new prospects for business owners and corporate innovators....
Structure and Interpretation of Computer Programs, JavaScript Edition (Harold Abelson, et al.)
By building a number of mental models for computation, this book introduces the reader to the fundamental concepts of computation.
The New Hacker's Dictionary (The Jargon File) by Eric S. Raymond
This page includes a glossary of terminology used by various computer hacker subcultures. What we describe here is the language hackers use among themselves for amusement, social contact, and...
Algorithms for Decision Making (Mykel Kochenderfer, et al)
In this book, algorithms for making decisions in the face of uncertainty are introduced in great detail. It introduces the underlying mathematical problem formulations and the strategies for addressing...
Machine Learning: A Probabilistic Perspective (Kevin Patrick Murphy)
Automated data analysis techniques are necessary given the Web-enabled flood of electronic data we face today. These are provided by machine learning, which creates techniques that can automatically find...
Exploratory Programming for the Arts and Humanities (Nick Montfort)
There are no prerequisites or assuming prior programming experience in this book, which introduces programming to readers interested in the arts and humanities.
The Constitution of Algorithms: Ground-Truthing, Programming, Formulating (Florian Jaton)
The technologies we use every day are powered by algorithms, which are sometimes used interchangeably with words like "big data," "machine learning," and "artificial intelligence." Arguments concerning the real...
Linguistics for the Age of AI (Marjorie McShane, et al)
This book presents a model of language understanding for intelligent agent systems that is human-inspired and linguistically complex.
Probabilistic Machine Learning: An Introduction (Kevin Patrick Murphy)
Using probabilistic models and inference as a unifying strategy, this book provides a thorough introduction to machine learning.
How Humans Judge Machines (Cesar A. Hidalgo, et al)
A thorough analysis of how individuals respond to human activities versus machine actions. This book investigates when and why people differentiate between humans and machines through dozens of tests....
Certified Programming with Dependent Types: A Pragmatic Introduction to the Coq Proof Assistant (Adam Chlipala)
Many different computer science research endeavors can benefit from the use of mechanized program verification technologies, and the use of similar formal proof-checking tools in mathematics and engineering is...

User reviews

There are no user reviews for this listing.
Ratings
Rate this Book
Comments