24 September 1999.
Source: Stefan Brands


A N N O U N C E M E N T

Thesis title:

     "Rethinking public key infrastructures and digital certificates --- building in privacy" (ISBN 90-901-3059-4, 304 pages, September 1999)

Author:

     Stefan Brands

Thesis defense date and location:

     October 4, 1999, Eindhoven University of Technology (Netherlands)

Thesis advisors:

     Prof. Henk C.A. van Tilborg (Eindhoven University of Technology)

     Prof. Adi Shamir (Weizmann Institute of Science)

Thesis reading committee:

     Prof. Ronald L. Rivest (Massachusetts Institute of Technology)

     Prof. Claus P. Schnorr (Johann Wolfgang Goethe University)

     Prof. Adi Shamir (Weizmann Institute of Science)

Summary:

Paper-based communication and transaction mechanisms are being replaced by electronic mechanisms at a breath-taking pace. The driving force behind this unstoppable transition is the desire to combat fraud, to reduce costs, and to address an array of new opportunities opened up by Internet and other telecommunication networks. Public key infrastructures, which center around the distribution and management of public keys and digital certificates, are widely regarded as the foundational technology for secure electronic communications and transactions, in cyberspace as well as in the real world.

While their future looks bright and shiny, public key infrastructures have a dark side. Today's public key infrastructures erode privacy in a manner unimaginable just a few decades ago. If the prevailing visions about digital certificates turn into reality, then everyone will be forced to communicate and transact in what will be the most pervasive electronic surveillance tool ever built.

This thesis analyzes the privacy dangers, and introduces highly practical digital certificates that can be used to design privacy-protecting electronic communication and transaction systems. The new certificates allow individuals, groups, and organizations to communicate and transact securely, in such a way that at all times they can determine for themselves when, how, and to what extent information about them is revealed to others, and to what extent others can link or trace this information. At the same time, the new techniques overcome many of the security and efficiency shortcomings of the currently available mechanisms, minimize the risk of identity fraud, and offer a myriad of benefits to organizations. They can be implemented in low-cost smartcards without cryptographic coprocessors, admit elliptic curve implementations with short keys, and encompass today's views about digital certificates and public key infrastructures as a special case.

Applications of the new techniques include, but are not limited to, electronic cash, pseudonyms for online chat rooms and public forums (virtual communities), access control (to Virtual PrivateNetworks, subscription-based services, buildings, databases, and so on), health care information exchange, electronic voting, electronic postage, Web site personalization, secure multi-agent systems, collaborative filtering, medical prescriptions, road-toll pricing, public transport tickets, loyalty schemes, and electronic gambling.

______________________________________

See http://www.xs4all.nl/~brands for a detailed overview of the contents of the thesis, online summaries (in English and in Dutch), several downloadable chapter parts, and contact information.