Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Projects

Showing 4 matching records.
Pairing-Based Cryptography
Recently, what are known as “pairings” on elliptic curves have been a very active area of research in cryptography. A pairing is a function that maps a pair of points on an elliptic curve into a finite field. Their unique properties have enabled many new cryptographic protocols that had not previously been feasible.In particular, identity-based encryption (IBE) is a pairing-based scheme that has received considerable attention. IBE uses some form of a person (or entity’s) identification to...
Privacy Engineering
 Additionally, the NIST privacy engineering program (PEP) supports the development of trustworthy information systems by applying measurement science and system engineering principles to the creation of frameworks, risk models, guidance, tools, and standards that protect privacy and, by extension, civil liberties.Visit the NIST Privacy Engineering project homepage for full details.
Privacy-Enhancing Cryptography
The privacy-enhancing cryptography project seeks to promote the use of communication protocols that do not reveal unneeded private information of the communicating parties.There are many technical challenges in doing this, as it is typically hard to separate private data from general data (e.g. to convert a third-party-signed date-of-birth certificate into a certificate indicating that a person is of voting age). Zero-knowledge (ZK) proof techniques and their variants can be used to...
Usability Of Security
Usability of Security Research ResultsThis work is part of the Comprehensive National Cybersecurity Initiative (CNCI) Research and Development effort. Our goal is to provide guidance for policymakers, system engineers and security professionals so that they can make better decisions that enhance the usability of cybersecurity in their organizations. Ideally, these decisions should: (1) Have a basis in real empirical data, (2) Create solutions that are secure in practice, not just in...