Untraceable electronic mail, return addresses, and digital pseudonyms

@article{Chaum1981UntraceableEM,
  title={Untraceable electronic mail, return addresses, and digital pseudonyms},
  author={D. Chaum},
  journal={Commun. ACM},
  year={1981},
  volume={24},
  pages={84-88}
}
  • D. Chaum
  • Published 1981
  • Computer Science
  • Commun. ACM
  • A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system. The technique does not require a universally trusted authority. One correspondent can remain anonymous to a second, while allowing the second to respond via an untraceable return address. The technique can also be used to form rosters of untraceable… CONTINUE READING
    3,030 Citations

    Topics from this paper

    Certified Pseudonyms Colligated with Master Secret Key
    • PDF
    Electronic Identities Need Private Credentials
    • 19
    • PDF
    Unique User-Generated Digital Pseudonyms
    • 22
    • PDF
    Accountable Anonymity: A Proxy Re-Encryption Based Anonymous Communication System
    • 10
    Secure Anonymous Communications with Practical Anonymity Revocation Scheme
    • 1
    TeleTrusT-OSIS and communication security
    • 3