Authors
Anna Lysyanskaya, Ronald L Rivest, Amit Sahai, Stefan Wolf
Publication date
2000
Conference
Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 Kingston, Ontario, Canada, August 9–10, 1999 Proceedings 6
Pages
184-199
Publisher
Springer Berlin Heidelberg
Description
Pseudonym systems allow users to interact with multiple organizations anonymously, using pseudonyms. The pseudonyms cannot be linked, but are formed in such a way that a user can prove to one organization a statement about his relationship with another. Such a statement is called a credential. Previous work in this area did not protect the system against dishonest users who collectively use their pseudonyms and credentials, i.e., share an identity. Previous practical schemes also relied very heavily on the involvement of a trusted center. In the present paper we give a formal definition of pseudonym systems where users are motivated not to share their identity, and in which the trusted center’s involvement is minimal. We give theoretical constructions for such systems based on any one-way function. We also suggest an efficient and easy-to-implement practical scheme.
Total citations
2000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024451023273240435051473943374136222422282017243311
Scholar articles
A Lysyanskaya, RL Rivest, A Sahai, S Wolf - Selected Areas in Cryptography: 6th Annual …, 2000
A Lysyanskaya, R Rivest, A Sahai, S Wolf - 1999