A Perfect Collision-Free Pseudonym System

A network entity can anonymously interact with other entities using a pseudonym instead of its original identifier. Under the assumption that pseudonyms are unlinkable to the entity's original identifier, the authors can provide anonymity for the entity against an adversary that seeks to gain information regarding the entity's original identifier. The most popular method of providing pseudonyms to network entities is to use the Entity generated Pseudonyms (EP), in which each entity's pseudonyms are generated from the outputs of a one-way hash function such as SHA-2 or MD5.

Provided by: Institute of Electrical & Electronic Engineers Topic: Security Date Added: Jun 2011 Format: PDF

Find By Topic