Description: “Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryption keys (subject to compromise) for confidentiality, and digital signatures (which provide strong, and in some jurisdictions, legal, proof of authorship) for authenticity.”
Author(s): Nikita Borisov – UC Berkeley, Ian Goldberg – Zero-Knowledge Systems, Eric Brewer – UC Berkeley