Anonymity, Unobservability, and Pseudonymity — A Proposal for Terminology
- First Online:
Based on the nomenclature of the early papers in the field, we propose a set of terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, unobservability, and pseudonymity (pseudonyms and digital pseudonyms, and their attributes). We hope that the adoption of this terminology might help to achieve better progress in the field by avoiding that each researcher invents a language of his/her own from scratch. Of course, each paper will need additional vocabulary, which might be added consistently to the terms defined here.
Unable to display preview. Download preview PDF.
- 5.David A. Cooper, Kenneth P. Birman: Preserving Privacy in a Network of Mobile Computers; 1995 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos 1995, 26–38.Google Scholar
- 6.Birgit Pfitzmann (collected by): Information Hiding Terminology-Results of an informal plenary meeting and additional proposals; Information Hiding, LNCS 1174, Springer-Verlag, Berlin 1996, 347–350.Google Scholar
- 7.Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: ISDN-MIXes-Untraceable Communication with Very Small Bandwidth Overhead; 7th IFIP International Conference on Information Security (IFIP/Sec’ 91), Elsevier, Amsterdam 1991, 245–258.Google Scholar
- 10.Stuart Stubblebine, Paul Syverson: Authentic Attributes with Fine-Grained Anonymity Protection; Financial Cryptography 2000, LNCS Series, Springer-Verlag, Berlin 2000.Google Scholar
- 11.Michael Waidner: Unconditional Sender and Recipient Untraceability in spite of Active Attacks; Eurocrypt’ 89, LNCS 434, Springer-Verlag, Berlin 1990, 302–319.Google Scholar