The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May-June (2013 vol.11)
pp: 68-71
Arvind Narayanan , Princeton University
ABSTRACT
Despite privacy-preserving cryptography technologies' potential, they've largely failed to find commercial adoption. Reasons include people's unawareness of privacy-preserving cryptography, developers' lack of expertise, the field's complexity, economic constraints, and trust issues. View part 1 of this article (from the March/April 2013 issue) here: http://doi.ieeecomputersociety.org/10.1109/MSP.2013.45.
INDEX TERMS
Cryptography, Software deveopment, Data privacy, Commercialization, Marketing and sales, Performance evaluation, Computer security, cryptography, Cryptography, Software deveopment, Data privacy, Commercialization, Marketing and sales, Performance evaluation, Computer security, security, Cryptography, Software deveopment, Data privacy, Commercialization, Marketing and sales, Performance evaluation, Computer security, privacy, crypto
CITATION
Arvind Narayanan, "What happened to the crypto dream?, Part 2", IEEE Security & Privacy, vol.11, no. 3, pp. 68-71, May-June 2013, doi:10.1109/MSP.2013.75
REFERENCES
1. A. Narayanan, "What Happened to the Crypto Dream?, Part 1," IEEE Security & Privacy, vol. 11, no. 2, 2013, pp. 75–76.
2. Y. Lindell and B. Pinkas, "A Proof of Yao's Protocol for Secure Two-Party Computation," Electronic Colloquium on Computational Complexity, 2004; http://eccc.hpi-web.de/report/2004063.
3. C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices," Proc. 41st Ann. ACM Symp. Theory of Computing (STOC 09), ACM, 2009, pp. 169–178.
4. A. Narayanan et al., "Location Privacy via Private Proximity Testing," Proc. 2011 Network and Distributed System Security Symp. (NDSS 11), Internet Soc., 2011; www.internetsociety.org/docprivacy-private-proximity-testing-paper.
5. A. Whitten and J.D. Tygar, "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0," Proc. 8th Usenix Security Symp., Usenix, 1999.
6. T. Duong and J. Rizzo, "Flickr's API Signature Forgery Vulnerability," 2009; http://vnhacker.blogspot.com/2009/09flickrs-api-signature-forgery.html.
7. Y. Dodis, T. Ristenpart, and T. Shrimpton, "Salvaging Merkle-Damgård for Practical Applications," Advances in Cryptology—-Eurocrypt 2009, LNCS 5479, Springer, 2009, pp. 371–388.
8. Y. Huang et al., "Faster Secure Two-Party Computation Using Garbled Circuits," Proc. 2011 Usenix Security Symp., Usenix, 2011.
9. H. Nissenbaum, "A Contextual Approach to Privacy Online," Daedalus, vol. 140, no. 4, 2011, pp. 32–48.
10. A. Acquisti, "Privacy in Electronic Commerce and the Economics of Immediate Gratification," Proc. 5th ACM Conf. Electronic Commerce (EC 04), ACM, 2004, pp. 21–29.
11. J. Zittrain, "The End of Crypto," Advances in Cryptology—Crypto 2012, Springer, 2012, p. 86.
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool