ITF Belgium > Program > Speakers  > Ernie Brickell
linkedin twitter facebook email


Ernie Brickell    





Ernie Brickell is an independent cryptology researcher.  His current research is on finding a solution to satisfy the conflicting requirements of individual and corporate needs for security / privacy, and law enforcement’s needs for information access.  He is a Fellow of the International Association for Cryptologic Research (IACR) and was founding Editor-in-Chief of the Journal of Cryptology.  Brickell is an author on over 30 publications and 70 patents in cryptology and has been an invited speaker at IACR conferences numerous times. With co-authors, Jan Camenish and Liqun Chen, Brickell developed the Direct Anonymous Attestation (DAA) protocol, an anonymous digital signature system, which enables a hardware device to prove that it is a trusted device without revealing the identity of that device.  This paper received the 10 year test-of-time award from the Computer and Communications Security (CCS) conference.  With co-author Jiangtao Li, Brickell developed the Enhanced Privacy ID (EPID), which improved the revocation capability of DAA so that an anonymous signer of a message can be revoked, still without revealing the identity of the signing device.  EPID has been implemented in Intel Corporation products and is a critical feature for the Internet of Things (IoT) strategy at Intel.  Ernie Brickell was the chief security architect during his employment at Intel.  He ran the Security Architecture Forum, which was the decision making body for security for all Intel products. During his career, he has also worked at Sandia National Laboratories, Bellcore, and CertCo. Brickell has a Ph.D. in Mathematics, and a Masters in Computer Science from the Ohio State University.


Back to session


Presentation abstract


In this talk, I will present a set of security and privacy requirements for a system which provides for authorized access to information by law enforcement. The requirements cover needs for individuals, corporate employees, technology companies with world wide markets, law enforcement, and auditors of law enforcement use of authorized access.  These requirements include protecting financial and personal security of an individual and intellectual property of a corporation, even in the event of a compromise of the law enforcement access capability.  They also include robust auditing of any use of the access capability.  I will give a brief overview of future device and system architecture to realize these requirements. 


Back to program

Back to speakers


Copyright imec 2017