A Perfect Collision-Free Pseudonym System

Download Now Date Added: Jun 2011
Format: PDF

A network entity can anonymously interact with other entities using a pseudonym instead of its original identifier. Under the assumption that pseudonyms are unlinkable to the entity's original identifier, the authors can provide anonymity for the entity against an adversary that seeks to gain information regarding the entity's original identifier. The most popular method of providing pseudonyms to network entities is to use the Entity generated Pseudonyms (EP), in which each entity's pseudonyms are generated from the outputs of a one-way hash function such as SHA-2 or MD5.