Overview of Zero-Knowledge Systems Inc

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

1 fairCASH: Concepts and Framework Yen Choon Ching Institute of Computer Science, University of Kiel, Germany Ver Sept 2008.
Claudia Diaz, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse K.U.Leuven IDIS Workshop 29/05/2008 [Work done in the context of the ADAPID project]
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
PKI versus Private Credentials1 Stefan Brands Zero-Knowledge Systems Inc. Montreal.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
FIT3105 Security and Identity Management Lecture 1.
Using Digital Credentials On The World-Wide Web M. Winslett.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Check It Out 1. 2 Introductions Instructor and student introductions Module overview.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
National Smartcard Project Work Package 8 – Security Issues Report.
Wireless Password: ONLINE GAMING / GAMBLING KNOW - YOUR - CUSTOMER AND RISK MANAGEMENT.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
September 20 th, 2006 U-Prove crypto overview Copyright © 2006, Quebec Inc. Proprietary and Confidential.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Bobby Caudill Solution Architect, Global Government August 2008 Adobe Solutions for Government.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Payment Systems. Payment Revolution 1970: Electronic Funds Transfer between banking industries 1980: Electronic Data Interchange (EDI) for e- commerce.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Robert Guerra Director, CryptoRights Foundation Implementing Privacy Implementing Privacy: Rules of the Game for Developers Mac-Crypto Conference on Macintosh.
Systems that support electronically executed business transactions.
1 X.509-style PKI Revolves around the distribution and management of digital identity certificates Invented in 1978 to facilitate message encryption In.
Check It Out 1. 2 Introductions Instructor and student introductions Module overview.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Systems that support electronically executed business transactions.
Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C.
DIGITIZING OUR WALLETS Digital Wallets for E-Commerce Development.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Unlinking Private Data
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
How to Stay Out of Jail as an Entrepreneur
Protecting Your Assets By Preventing Identity Theft
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Privacy and Security Basics for CDSME Data Collection
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Private Debt Collection
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
SECURITY FEATURES OF ATM
BY GAWARE S.R. DEPT.OF COMP.SCI
Create Your Own Cryptocurrency Exchange – Know These Benefits.
E-Commerce Security.
Computers and Data Collection
Wiretapping and Encryption
Who Uses Encryption? Module 7 Section 3.
European Citizens’ Initiative, Commission regulation proposal Focus on IT aspects Jérôme Stefanini DIGIT.B.2 05/06/2018.
Pooja programmer,cse department
Chapter 6 Innovative Systems: From E-Government and E-Learning to C2C E-Commerce and Collaborative Commerce.
Welcome To Money pad November 23, 2018 Sample footer.
Privacy and Information
Secure Electronic Transaction (SET) University of Windsor
Public Key Infrastructure from the Most Trusted Name in e-Security
Identity Theft Prevention Program Training
Moving from Consumers to Producers Kings Park Central School District
Chapter 6 Innovative Systems: From E-Government and E-Learning to C2C E-Commerce and Collaborative Commerce.
Presentation transcript:

Overview of Zero-Knowledge Systems Inc Overview of Zero-Knowledge Systems Inc. and the Private Credentials Technology December 5th 2000 Eric Bergeron General Manager – Wireless Solutions All information contained within is CONFIDENTIAL AND PROPRIETARY INFORMATION © Zero Knowledge Systems Inc, November 18, Montreal, Canada. All rights reserved.

Privacy – What is it? Information self-determination The claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others Personally Identifiable Information (PII) is any information which can be used to identify a specific individual Not just name, address, SSN/SIN Data elements such as date of birth + zip code, or transactional history can narrow the focus down to a small enough group of people to be considered PII In an increasingly networked world, the privacy issue is becoming more and more important Ease and speed of information capture, storage and dissemination Online/offline profile matching Cross-site tracking using cookies, web bugs, etc. Internet connected appliances Wireless location-based tracking

OECD 8 Principles of Fair Information Practice Defining Privacy vs. Security OECD 8 Principles of Fair Information Practice Collection Limitation Data Quality Purpose Specification Use Limitation Openness Individual Participation Accountability 5. Security safeguards Security is a sub-set of privacy. You can address all of your security concerns without addressing privacy.

Zero-Knowledge Private Credentials

Digital Certificates Sequences of zeros and ones (of a mathematical structure) Verifiable with 100 % accuracy by computers Transferable electronically (no human intervention, fast) Unforgeable (crypto protection) Can specify any kind of data

Drawbacks to organizations Transaction delays Lost business (faulty/ irrelevant data, online connection fails) Central database verification Hard to protect databases against hackers and insiders Privacy standards bring compliance costs Manage CRLs / online validation

Privacy Concerns Traceability (CA, verifiers, wiretappers, intel. agencies) Discrimination (consults any database) No control over secondary use Revocation (CRL, online whitelists)

Private Credentials Similar to coins and public transport tickets (not identifiable) Encode attributes in the private key Selectively disclose the attributes Practical Security benefits

Selective Disclosure Show part of attribute data without revealing more (think: marker) More powerful than paper-based certificates (Boolean properties, n out of m, intervals) Works across different Private Credentials

Fraud Protections Reduce identity fraud Eliminate central database risks Discourage lending (encode secret of user) Discourage discarding (tie unfavorable attributes in) Limited-show property (identity computable if shown too often)

Private Payment (E-Cash) Special case of private credential System prototype is working today An attribute contains information about a currency (issuer, denomination, etc.). Always Revealed in the showing protocol An attribute contains personal information for “off-line fraud tracing”. Never revealed in the showing protocol The payment is the transcript of a showing protocol

Sample Applications Prepaid for Mobile Phones Private Payment (e-cash) for ME-Commerce ID cards (with privacy) Road-toll and public transport pricing/ticketing Digital copyright protection (certificates permit use of works) Access control (VPNs, subscription services, Web sites, databases) Medical prescriptions / medical files Electronic voting Online auctions Financial securities trading Electronic gambling Loyalty schemes

Smartcard Implementation Strong protection against loss, theft, extortion, lending,copying, discarding, etc. Uses mathematical primitives which are present in crypto enabled smartcards. Can be used in conjunction with desktop computer, PDA, etc. in which case we can use standard 8-bit smartcards.