Designing Privacy Enhancing Technologies pp 1-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2009)

Anonymity, Unobservability, and Pseudonymity — A Proposal for Terminology

  • Andreas Pfitzmann
  • Marit Köhntopp
Chapter

Abstract

Based on the nomenclature of the early papers in the field, we propose a set of terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, unobservability, and pseudonymity (pseudonyms and digital pseudonyms, and their attributes). We hope that the adoption of this terminology might help to achieve better progress in the field by avoiding that each researcher invents a language of his/her own from scratch. Of course, each paper will need additional vocabulary, which might be added consistently to the terms defined here.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    David Chaum: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms; Communications of the ACM 24/2 (1981) 84–88.CrossRefGoogle Scholar
  2. 2.
    David Chaum: Security without Identification: Transaction Systems to make Big Brother Obsolete; Communications of the ACM 28/10 (1985) 1030–1044.CrossRefGoogle Scholar
  3. 3.
    David Chaum: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability; Journal of Cryptology 1/1 (1988) 65–75.MATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    David Chaum: Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms; Auscrypt’ 90, LNCS 453, Springer-Verlag, Berlin 1990, 246–264.CrossRefGoogle Scholar
  5. 5.
    David A. Cooper, Kenneth P. Birman: Preserving Privacy in a Network of Mobile Computers; 1995 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos 1995, 26–38.Google Scholar
  6. 6.
    Birgit Pfitzmann (collected by): Information Hiding Terminology-Results of an informal plenary meeting and additional proposals; Information Hiding, LNCS 1174, Springer-Verlag, Berlin 1996, 347–350.Google Scholar
  7. 7.
    Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner: ISDN-MIXes-Untraceable Communication with Very Small Bandwidth Overhead; 7th IFIP International Conference on Information Security (IFIP/Sec’ 91), Elsevier, Amsterdam 1991, 245–258.Google Scholar
  8. 8.
    Andreas Pfitzmann, Michael Waidner: Networks without user observability-design options; Eurocrypt’ 85, LNCS 219, Springer-Verlag, Berlin 1986, 245–253; revised and extended version in: Computers & Security 6/2 (1987) 158-166.CrossRefGoogle Scholar
  9. 9.
    C. E. Shannon: Communication Theory of Secrecy Systems; The Bell System Technical Journal 28/4 (1949) 656–715.MathSciNetGoogle Scholar
  10. 10.
    Stuart Stubblebine, Paul Syverson: Authentic Attributes with Fine-Grained Anonymity Protection; Financial Cryptography 2000, LNCS Series, Springer-Verlag, Berlin 2000.Google Scholar
  11. 11.
    Michael Waidner: Unconditional Sender and Recipient Untraceability in spite of Active Attacks; Eurocrypt’ 89, LNCS 434, Springer-Verlag, Berlin 1990, 302–319.Google Scholar
  12. 12.
    J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, G. Wolf: Modeling the security of steganographic systems; 2nd Workshop on Information Hiding, LNCS 1525, Springer-Verlag, Berlin 1998, 345–355.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Andreas Pfitzmann
    • 1
  • Marit Köhntopp
    • 2
  1. 1.Department of Computer ScienceDresden University of TechnologyDresdenGermany
  2. 2.Independent Centre for Privacy Protection Schleswig-Holstein, GermanyUnabhängiges Landeszentrum für Datenschutz Schleswig-HolsteinKielGermany

Personalised recommendations