Vis-à-vis Cryptography: Private and Trustworthy In-Person Certifications

The growing role of mobile devices in previously face to face interactions presents new domains for cryptographic applications. At the same, time the increased role of digital systems raises new security and privacy issues. With some thirty thousand notifications sent, inSPOT.org's electronic notification of exposure to sexually transmitted infections is one such concerning development. This paper explores those concerns, the features of an ideal service for both notification and certification, and outlines protocols for cryptographic solutions.

[1]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[2]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[3]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[4]  David Chaum,et al.  Wallet Databases with Observers , 1992, CRYPTO.

[5]  Stefan Brands,et al.  Rapid Demonstration of Linear Relations Connected by Boolean Operators , 1997, EUROCRYPT.

[6]  J. Camenisch,et al.  Proof systems for general statements about discrete logarithms , 1997 .

[7]  Jan Camenisch,et al.  Group signature schemes and payment systems based on the discrete logarithm problem , 1998 .

[8]  Christoph U. Lehmann,et al.  Development and health care needs of lesbians. , 1998, Journal of women's health.

[9]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[10]  Jan Camenisch,et al.  Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes , 1998, EUROCRYPT.

[11]  M. McFarlane,et al.  Soliciting sex on the Internet: what are the risks for sexually transmitted diseases and HIV? , 2000, Sexually transmitted diseases.

[12]  Moni Naor,et al.  Deniable Ring Authentication , 2002, CRYPTO.

[13]  Jan Camenisch,et al.  A Signature Scheme with Efficient Protocols , 2002, SCN.

[14]  M. McFarlane,et al.  Young adults on the Internet: risk behaviors for sexually transmitted diseases and HIV(1). , 2002, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[15]  G. Burstein,et al.  Sexually transmitted diseases treatment guidelines , 2003, Current opinion in pediatrics.

[16]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[17]  Moni Naor,et al.  Concurrent zero-knowledge , 2004, JACM.

[18]  K. Ghanem,et al.  Audio computer assisted self interview and face to face interview modes in assessing response bias among STD clinic patients , 2005, Sexually Transmitted Infections.

[19]  Jan Camenisch,et al.  Compact E-Cash , 2005, EUROCRYPT.

[20]  Dan Suciu,et al.  Journal of the ACM , 2006 .

[21]  J. Klausner,et al.  inSPOT: The First Online STD Partner Notification System Using Electronic Postcards , 2008, PLoS medicine.

[22]  M. Hogben,et al.  A Review of Partner Notification for Sex Partners of Men Infected With Chlamydia , 2008, Sexually transmitted diseases.

[23]  G. Dagne,et al.  Does the Internet represent a sexual health risk environment for young people? , 2012, Sexually transmitted diseases.

[24]  S. Noar,et al.  Sensation Seeking and Impulsivity: Combined Associations with Risky Sexual Behavior in a Large Sample of Young Adults , 2013, Journal of sex research.