The dancing bear: a new way of composing ciphers (transcript of discussion)

  • Authors:
  • Ross Anderson

  • Affiliations:
  • Cambridge University, UK

  • Venue:
  • SP'04 Proceedings of the 12th international conference on Security Protocols
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

This talk is about how we go about composing privacy properties. This workshop is about protecting privacy, and authentication and privacy are not only functionally in conflict, they also use different kind of technical mechanisms. Now how do we “compose” cryptographic primitives? I’ve put “compose” in inverted commas because it is also used by the operating system guys to describe a separate bundle of issues. If you can come up with a better slogan for what’s going on here then I would very much like to hear it.