Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms

  title={Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms},
  author={David Chaum},
  journal={Commun. ACM},
A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication in spite of an unsecured underlying telecommunication system. The technique does not require a universally trusted authority. One correspondent can remain anonymous to a second, while allowing the second to respond via an untraceable return address. The technique can also be used to form rosters of untraceable… CONTINUE READING
Highly Influential
This paper has highly influenced 64 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 767 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-10 of 474 extracted citations

Provable anonymity

View 8 Excerpts
Highly Influenced

Reusable anonymous return channels

View 6 Excerpts
Highly Influenced

LEAF: A privacy-conscious social network-based intervention tool for IPV survivors

Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014) • 2014
View 6 Excerpts
Highly Influenced

Provable Unlinkability Against Traffic Analysis with Low Message Overhead

Journal of Cryptology • 2013
View 9 Excerpts
Highly Influenced

Reasoning about minimal anonymity in security protocols

Future Generation Comp. Syst. • 2013
View 4 Excerpts
Highly Influenced

768 Citations

Citations per Year
Semantic Scholar estimates that this publication has 768 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.

Similar Papers

Loading similar papers…