{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Anon_Terminology_v0.11 - Anonymity Unobservability and...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology Change History Draft v0.1 July 28, 2000 Andreas Pfitzmann, [email protected] Draft v0.2 Aug. 25, 2000 Marit Köhntopp, [email protected] Draft v0.3 Aug. 26-Sep. 01, 2000 Andreas Pfitzmann, Marit Köhntopp Draft v0.4 Sep. 13, 2000 Andreas Pfitzmann, Marit Köhntopp Changes in sections Anonymity, Unobservability, Pseudonymity Draft v0.5 Oct. 03, 2000 Adam Shostack, [email protected], Andreas Pfitzmann, Marit Köhntopp Changed definitions, unlinkable pseudonym Draft v0.6 Nov. 26, 2000 Andreas Pfitzmann, Marit Köhntopp Changed order, role-relationship pseudonym, references Draft v0.7 Dec. 07, 2000 Marit Köhntopp, Andreas Pfitzmann Draft v0.8 Dec. 10, 2000 Relationship to Information Hiding Terminology Draft v0.9 April 1, 2001 Andreas Pfitzmann, Marit Köhntopp IHW review comments Draft v0.10 April 9, 2001 Andreas Pfitzmann, Marit Köhntopp Clarifying remarks Draft v0.11 May 18, 2001 Marit Köhntopp, Andreas Pfitzmann Annotations from IHW discussion Abstract Based on the nomenclature of the early papers in the field, we propose a terminology which is both expressive and precise. More particularly, we define anonymity , unlinkability , unobservability , and pseudonymity ( pseudonyms and digital pseudonyms , and their attributes). 1 Introduction Early papers from the 80ies already deal with anonymity, unlinkability, unobservability, and pseudonymity and introduce these terms within the respective context of proposed measures. We show relationships between these terms and thereby develop a consistent terminology. Then we contrast these definitions with newer approaches, e.g., from ISO IS 15408. We hope that the adoption of this terminology might help to achieve better progress in the field by avoiding that each researcher invents a language of his/her own from scratch. Of course, each paper will need additional vocabulary, which might be added consistently to the terms defined here. This document is organized as follows: First the setting used is described. Then definitions of anonymity, unlinkability, and unobservability are given and the relationships between the respective terms are outlined. Afterwards, known mechanisms to achieve anonymity and unobservability are listed. The next sections deal with pseudonymity, i.e. pseudonyms, the corresponding mechanisms, and their properties. Finally, concluding remarks are given. 2 Setting We develop this terminology in the usual setting that senders send messages to recipients using a communication network. For other settings, e.g., users querying a database, customers
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
- 2 - shopping in an e-commerce shop, the same terminology can be derived by abstracting away the special names “sender”, “recipient”, and “message”. But for ease of explanation, we use the specific setting here.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.
  • Fall '08
  • Staff
  • Public-key cryptography, Pseudonym, Pseudonymity, Anonymity, Unobservability, Marit Köhntopp Andreas Pfitzmann

{[ snackBarMessage ]}