Unique User-Generated Digital Pseudonyms

This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pseudonym locally in his personal security environment, e.g. in his smart card or his personal digital assistant. There is no need fo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Schartner, Peter, Schaffer, Martin
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 205
container_issue
container_start_page 194
container_title
container_volume
creator Schartner, Peter
Schaffer, Martin
description This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pseudonym locally in his personal security environment, e.g. in his smart card or his personal digital assistant. There is no need for any information interchange between issuing parties or global data (especially keys), except unique identifiers for each user and each device of the system. Additionally the holder can prove, that he generated a specific pseudonym without revealing his identity and he can reveal his identity by disclosing the pseudonym. Whereas the verifier of a disclosed pseudonym can be sure, that the presenter of the pseudonym is the holder of the pseudonym (i.e. the person which originally generated it). The identifier of the user and the identifier of the user’s device will be used to generate unique pseudonyms, but to ensure pseudonymity, both components will be stored in the pseudonym in encrypted form.
doi_str_mv 10.1007/11560326_15
format Book Chapter
fullrecord <record><control><sourceid>springer</sourceid><recordid>TN_cdi_springer_books_10_1007_11560326_15</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>springer_books_10_1007_11560326_15</sourcerecordid><originalsourceid>FETCH-LOGICAL-c231t-81b7d2e228e8da7cfefcaca1a4e89616d25789370f801a45cf030ce1681ae10f3</originalsourceid><addsrcrecordid>eNpNkDtPw0AQhI-XRAiu-AMuoTjYvbXvUaIAASkSFLi2Lue9yBBs8DkF_x5HUDDNSDPS6NMIcYFwjQDmBrHUQErXWB6IMyoLIHTOwqGYoUaURIU7Epkzdt8ph0j2WMyAQElnCjoVWUpvMIlQW4szcVl17deO8yrxIJfc8eBHbvK7dtOOfpu_JN41fff9kc7FSfTbxNmfz0X1cP-6eJSr5-XT4nYlgyIcpcW1aRQrZdk23oTIMfjg0RdsnUbdqNJYRwaihSksQ5zgAk806Bkh0lxc_e6mz6HtNjzU675_TzVCvb-g_ncB_QA990e1</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype></control><display><type>book_chapter</type><title>Unique User-Generated Digital Pseudonyms</title><source>Springer Books</source><creator>Schartner, Peter ; Schaffer, Martin</creator><contributor>Gorodetsky, Vladimir ; Kotenko, Igor ; Skormin, Victor</contributor><creatorcontrib>Schartner, Peter ; Schaffer, Martin ; Gorodetsky, Vladimir ; Kotenko, Igor ; Skormin, Victor</creatorcontrib><description>This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pseudonym locally in his personal security environment, e.g. in his smart card or his personal digital assistant. There is no need for any information interchange between issuing parties or global data (especially keys), except unique identifiers for each user and each device of the system. Additionally the holder can prove, that he generated a specific pseudonym without revealing his identity and he can reveal his identity by disclosing the pseudonym. Whereas the verifier of a disclosed pseudonym can be sure, that the presenter of the pseudonym is the holder of the pseudonym (i.e. the person which originally generated it). The identifier of the user and the identifier of the user’s device will be used to generate unique pseudonyms, but to ensure pseudonymity, both components will be stored in the pseudonym in encrypted form.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540291138</identifier><identifier>ISBN: 354029113X</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540319980</identifier><identifier>EISBN: 9783540319986</identifier><identifier>DOI: 10.1007/11560326_15</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Asymmetric Encryption ; Information Interchange ; Public Exponent ; Smart Card ; Symmetric Encryption</subject><ispartof>Computer Network Security, 2005, p.194-205</ispartof><rights>Springer-Verlag Berlin Heidelberg 2005</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c231t-81b7d2e228e8da7cfefcaca1a4e89616d25789370f801a45cf030ce1681ae10f3</citedby><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11560326_15$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11560326_15$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>776,777,781,790,27906,38236,41423,42492</link.rule.ids></links><search><contributor>Gorodetsky, Vladimir</contributor><contributor>Kotenko, Igor</contributor><contributor>Skormin, Victor</contributor><creatorcontrib>Schartner, Peter</creatorcontrib><creatorcontrib>Schaffer, Martin</creatorcontrib><title>Unique User-Generated Digital Pseudonyms</title><title>Computer Network Security</title><description>This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pseudonym locally in his personal security environment, e.g. in his smart card or his personal digital assistant. There is no need for any information interchange between issuing parties or global data (especially keys), except unique identifiers for each user and each device of the system. Additionally the holder can prove, that he generated a specific pseudonym without revealing his identity and he can reveal his identity by disclosing the pseudonym. Whereas the verifier of a disclosed pseudonym can be sure, that the presenter of the pseudonym is the holder of the pseudonym (i.e. the person which originally generated it). The identifier of the user and the identifier of the user’s device will be used to generate unique pseudonyms, but to ensure pseudonymity, both components will be stored in the pseudonym in encrypted form.</description><subject>Asymmetric Encryption</subject><subject>Information Interchange</subject><subject>Public Exponent</subject><subject>Smart Card</subject><subject>Symmetric Encryption</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540291138</isbn><isbn>354029113X</isbn><isbn>3540319980</isbn><isbn>9783540319986</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2005</creationdate><recordtype>book_chapter</recordtype><sourceid/><recordid>eNpNkDtPw0AQhI-XRAiu-AMuoTjYvbXvUaIAASkSFLi2Lue9yBBs8DkF_x5HUDDNSDPS6NMIcYFwjQDmBrHUQErXWB6IMyoLIHTOwqGYoUaURIU7Epkzdt8ph0j2WMyAQElnCjoVWUpvMIlQW4szcVl17deO8yrxIJfc8eBHbvK7dtOOfpu_JN41fff9kc7FSfTbxNmfz0X1cP-6eJSr5-XT4nYlgyIcpcW1aRQrZdk23oTIMfjg0RdsnUbdqNJYRwaihSksQ5zgAk806Bkh0lxc_e6mz6HtNjzU675_TzVCvb-g_ncB_QA990e1</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Schartner, Peter</creator><creator>Schaffer, Martin</creator><general>Springer Berlin Heidelberg</general><scope/></search><sort><creationdate>2005</creationdate><title>Unique User-Generated Digital Pseudonyms</title><author>Schartner, Peter ; Schaffer, Martin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c231t-81b7d2e228e8da7cfefcaca1a4e89616d25789370f801a45cf030ce1681ae10f3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Asymmetric Encryption</topic><topic>Information Interchange</topic><topic>Public Exponent</topic><topic>Smart Card</topic><topic>Symmetric Encryption</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Schartner, Peter</creatorcontrib><creatorcontrib>Schaffer, Martin</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Schartner, Peter</au><au>Schaffer, Martin</au><au>Gorodetsky, Vladimir</au><au>Kotenko, Igor</au><au>Skormin, Victor</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Unique User-Generated Digital Pseudonyms</atitle><btitle>Computer Network Security</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2005</date><risdate>2005</risdate><spage>194</spage><epage>205</epage><pages>194-205</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540291138</isbn><isbn>354029113X</isbn><eisbn>3540319980</eisbn><eisbn>9783540319986</eisbn><abstract>This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pseudonym locally in his personal security environment, e.g. in his smart card or his personal digital assistant. There is no need for any information interchange between issuing parties or global data (especially keys), except unique identifiers for each user and each device of the system. Additionally the holder can prove, that he generated a specific pseudonym without revealing his identity and he can reveal his identity by disclosing the pseudonym. Whereas the verifier of a disclosed pseudonym can be sure, that the presenter of the pseudonym is the holder of the pseudonym (i.e. the person which originally generated it). The identifier of the user and the identifier of the user’s device will be used to generate unique pseudonyms, but to ensure pseudonymity, both components will be stored in the pseudonym in encrypted form.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11560326_15</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Computer Network Security, 2005, p.194-205
issn 0302-9743
1611-3349
language eng
recordid cdi_springer_books_10_1007_11560326_15
source Springer Books
subjects Asymmetric Encryption
Information Interchange
Public Exponent
Smart Card
Symmetric Encryption
title Unique User-Generated Digital Pseudonyms
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T12%3A09%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-springer&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Unique%20User-Generated%20Digital%20Pseudonyms&rft.btitle=Computer%20Network%20Security&rft.au=Schartner,%20Peter&rft.date=2005&rft.spage=194&rft.epage=205&rft.pages=194-205&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540291138&rft.isbn_list=354029113X&rft_id=info:doi/10.1007/11560326_15&rft_dat=%3Cspringer%3Espringer_books_10_1007_11560326_15%3C/springer%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540319980&rft.eisbn_list=9783540319986&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true