CLIP : Cryptography Law, Information & Privacy An interdisciplinary panel Aggelos Kiayias (U. Athens) Ioannis Iglezakis (AUTH) Panayiotis Rizomiliotis (U. Aegean) Lilian Mitrou (U. Aegean) crypto.di.uoa.gr
CLIP • The objective: Bring together legal and cryptography experts to debate definitions and solution approaches to the common set of problems they face. • The format: live dialogue & quick-paced exchange. • An ambition: be able to develop “cryptolegal frameworks” as needed where the cryptographic and legal thought is melded together.
1. What is a Ciphertext? High value encryption personal information should be can be prohibited permitted? cloud storage & digital processing archiving
2. When is Data Processing“Privacy-Preserving”? Case Study I : Danish Sugar Beet Auction Danish Sugarbeet Association buys sugar beets Developers’ Server Case Study II : Norwegian E-voting “The vote servers are maintained by different Ministries – one at the Ministry of Justice and the other at the Ministry of Industry and Trade.” Case Study III : your data
3. Should information access be proactively provisioned? Lack of proactiveness: can render information access infeasible. side-effect: law enforcement & intelligence may try to poke holes in system security. Proactiveness (implies “key escrow”): keys may be subverted thus jeopardizing security en masse.
CLIP : Cryptography Law, Information & Privacy An interdisciplinary panel Aggelos Kiayias (U. Athens) Ioannis Iglezakis (AUTH) Panayiotis Rizomiliotis (U. Aegean) Lilian Mitrou (U. Aegean) crypto.di.uoa.gr
Recommend
More recommend