Pseudonymity in the Light of Evidence-Based Trust (Transcript of Discussion)
Part of the
Lecture Notes in Computer Science
book series (LNCS, volume 3957)
Surely as soon as you link two pseudonyms once, then you can’t take that information away from an adversary. But what you said may be theoretically possible if you could prove that you also have another pseudonym that has good reputation without revealing it, which is really I think the property you’re looking for.
KeywordsInformation System Operating System Communication Network Problem Complexity Algorithm Analysis
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
to read the full conference paper text
© Springer-Verlag Berlin Heidelberg 2006