|
What's the problem?
- The original problem posed: Alice to send an encrypted message to Bob without the use of shared secrets or certificates.
- We extend this to include: Bob must meet certain conditions such as having a particular role or qualification.
- Existing solutions require heavyweight infrastructure, PKI, directories etc. that impose high costs and overhead in keeping up to date.
What are we doing?
- joint demonstration, with the UK's Communications-Electronics Security Group (CESG), of a candidate application of this technology at the Royal Society Summer Exhibition
- exploring extensions to the technology and further ways to exploit it in various large-scale applications
- Please refer to the IBE tutorial for more a more detailed explanation of this technology
Tutorial
Privacy
and identity management publications
Manageability
Information Flow Control
Trusted Linux
For more information contact:
Keith Harrison
keith.harrison@hp.com
|
|
|
|