Provided by: Association for Computing Machinery
Date Added: Nov 2009
In numerous scenarios, the recipient's identity in a transmission needs to be kept private. This allows users to maintain some privacy. Protecting communication content may be not enough, as already observed in a couple of papers (e.g., [1, 2, and 13]). This paper presents a simple and generic transformation that adds traceability to an anonymous encryption scheme. The authors focus on the case of honest senders, which finds applications in many real-life scenarios. Advantageously, their transformation can be applied to already deployed public-key infrastructures. Two concrete implementations are provided.