Keith Harrison - HP Trusted Computing Lab
Jan 22, 2003
AbstractWe give a "notably different" approach to public key cryptography which
allows an arbitrary identifier, chosen by the sender rather than the
recipient, to be used as a public key, to which the private complement
can be generated (possibly after the encrypted message has been
received) by a third-party Trust Authority (also chosen by the
sender). Signature analogues also exist. We skip gazelle-like over
the details of the elliptic-curve-point-pairing basis for the more
computationally efficient variant, and concentrate on the contrast in
key management and key certification this approach has as compared with
RSA-based public key systems.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.
- Ultra-Secure, Ultra-Reliable Trusted Microelectronics Development Project to Focus on Hardware First
- Purdue’s Garimella Gets U.S. Presidential Nod for National Science Board
- More News »