Skip to main content
  • 127 Accesses

Synonyms

Nym

Related Concepts

Anonymity; Unlinkability

Definition

In the paper-based world, a pseudonym is a ficticious name for an individual. Examples are pen names, aliases, legalized names, or working names. In the realm of electronic communication, a pseudonym (or sometimes just “nym”) can be any identifier that an individual or object uses in a particular context. The purpose of using pseudonyms is to identify an individual or object in the respective context while leaving it unidentified in other (unintended) contexts. In effect, one keeps transactions in different contexts separate such that observers who have access to both contexts cannot link the transactions of the same individual or those related to the same object (anonymity and unlinkability).

Background

In oppressive political environments, people use pseudonyms to make public political statements and to hide the identities of their correspondents. In more tolerant environments, people use pseudonyms to avoid...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–88

    Google Scholar 

  2. Chaum D (1986) Showing credentials without identification – signatures transferred between unconditionally unlinkable pseudonyms. In: Pichler F (ed) Advances in cryptology – EUROCRYPT’85. Lecture notes in computer science, vol 219. Springer, Berlin, pp 241–244

    Google Scholar 

  3. Froomkin M (1996) Flood control on the information ocean: living with anonymity, digital cash, and distributed databases. University of Pittsburgh. J Law Commerce 15:395

    Google Scholar 

  4. Mazieres D, Kaashoek F (1998) The desgin, implementation and operation of an email pseudonym server. 5th ACM conference on computer and communications security. ACM Press, New York, pp 27–36

    Google Scholar 

  5. Pfitzmann A, Köhntopp M (2001) Anonymity, unobservability, and pseudonymity—a proposal for terminology. In: Frederrath H (ed) Designing privacy enhancing technologies. Lecture in computer science, vol 2009. Springer, Berlin, pp 1–9

    Google Scholar 

  6. Rao JR, Rohatgi P (2000) Can pseudonyms really guarantee privacy? 9th Usenix Symposium, Denver, August

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Bleumer, G. (2011). Pseudonyms. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_216

Download citation

Publish with us

Policies and ethics