Sciweavers

CCS
2003
ACM

Receiver anonymity via incomparable public keys

14 years 5 months ago
Receiver anonymity via incomparable public keys
We describe a new method for protecting the anonymity of message receivers in an untrusted network. Surprisingly, existing methods fail to provide the required level of anonymity for receivers (although those methods do protect sender anonymity). Our method relies on the use of multicast, along with a novel cryptographic primitive that we call an Incomparable Public Key cryptosystem, which allows a receiver to efficiently create many anonymous “identities” for itself without divulging that these separate “identities” actually refer to the same receiver, and without increasing the receiver’s workload as the number of identities increases. We describe the details of our method, along with a prototype implementation. Categories and Subject Descriptors E.3 [Data]: [Data Encryption] General Terms Security Keywords Anonymity, PGP, Public Key Cryptography, Privacy
Brent R. Waters, Edward W. Felten, Amit Sahai
Added 06 Jul 2010
Updated 06 Jul 2010
Type Conference
Year 2003
Where CCS
Authors Brent R. Waters, Edward W. Felten, Amit Sahai
Comments (0)