{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Anon_Terminology_v0.26-1 - Anonymity Unlinkability...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology (Version v0.26 Dec. 13, 2005) Andreas Pfitzmann Marit Hansen TU Dresden ULD Kiel [email protected] [email protected] Archive of this Document http://dud.inf.tu-dresden.de/Anon_Terminology.shtml (v0.5 and all succeeding versions) Abstract Based on the nomenclature of the early papers in the field, we propose a terminology which is both expressive and precise. More particularly, we define anonymity , unlinkability , unobservability , pseudonymity ( pseudonyms and digital pseudonyms , and their attributes), and identity management . In addition, we describe the relationships between these terms, give a rational why we define them as we do, and sketch the main mechanisms to provide for the properties defined. Table of contents 1 Introduction .......................................................................................................................................... 4 2 Setting .................................................................................................................................................. 4 3 Anonymity ............................................................................................................................................ 6 4 Unlinkability ......................................................................................................................................... 8 5 Anonymity in terms of unlinkability ..................................................................................................... 9 6 Unobservability .................................................................................................................................. 10 7 Relationships between terms ........................................................................................................... 11 8 Known mechanisms for anonymity and unobservability ................................................................ 12 9 Pseudonymity .................................................................................................................................... 13 10 Pseudonymity with respect to accountability and authorization .................................................. 15 10.1 Digital pseudonyms to authenticate messages ..................................................................... 15 10.2 Authentication of digital pseudonyms ..................................................................................... 15 10.3 Transferring authenticated attributes and authorizations between pseudonyms ................ 16 11 Pseudonymity with respect to linkability ........................................................................................ 16 11.1 Knowledge of the linking between the pseudonym and its holder ....................................... 16 11.2 Linkability due to the use of a pseudonym in different contexts ........................................... 17 12 Known mechanisms and other properties of pseudonyms .......................................................... 19 13 Identity management ...................................................................................................................... 20 13.1 Setting ....................................................................................................................................... 20 13.2 Identity and identifiability ......................................................................................................... 20 13.3 Identity-related terms ............................................................................................................... 21 Role ............................................................................................................................................... 21 Partial identity ............................................................................................................................... 22 Digital identity ................................................................................................................................ 22 Virtual identity ............................................................................................................................... 23 13.4 Identity management-related terms ........................................................................................ 23
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
- 2 - Identity management .................................................................................................................... 23 Privacy-enhancing identity management .................................................................................... 23 Privacy-enhancing identity management enabling application design ..................................... 23 Identity management system (IMS) ............................................................................................. 23 Privacy-enhancing identity management system (PE-IMS) ...................................................... 24 14 Concluding remarks ........................................................................................................................ 24 References ........................................................................................................................................... 24 Index ...................................................................................................................................................... 26 Translation of essential terms ............................................................................................................. 28 To French .......................................................................................................................................... 28 To German ........................................................................................................................................ 33 To Greek ........................................................................................................................................... 36 To Italian ........................................................................................................................................... 40 To <your mother tongue> ................................................................................................................ 44 List of abbreviations DC-net Dining Cryptographers network ID IDentifier of a subject iff if and only if IHW Information Hiding Workshop IMS Identity Management System IOI Item Of Interest ISO International Standardization Organization MMORPG Massively Multiplayer Online Role Playing Games MUD Multi User Dungeon PE-IMS Privacy-Enhancing Identity Management System PETs Privacy-Enhancing Technologies PGP Pretty Good Privacy Change History v0.1 July 28, 2000 Andreas Pfitzmann, [email protected] v0.2 Aug. 25, 2000 Marit Köhntopp, [email protected] v0.3 Sep. 01, 2000 Andreas Pfitzmann, Marit Köhntopp v0.4 Sep. 13, 2000 Andreas Pfitzmann, Marit Köhntopp: Changes in sections Anonymity, Unobservability, Pseudonymity v0.5 Oct. 03, 2000 Adam Shostack, [email protected], Andreas Pfitzmann, Marit Köhntopp: Changed definitions, unlinkable pseudonym v0.6 Nov. 26, 2000 Andreas Pfitzmann, Marit Köhntopp:
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}