Synonyms
Related Concepts
Definition
In the paper-based world, a pseudonym is a ficticious name for an individual. Examples are pen names, aliases, legalized names, or working names. In the realm of electronic communication, a pseudonym (or sometimes just “nym”) can be any identifier that an individual or object uses in a particular context. The purpose of using pseudonyms is to identify an individual or object in the respective context while leaving it unidentified in other (unintended) contexts. In effect, one keeps transactions in different contexts separate such that observers who have access to both contexts cannot link the transactions of the same individual or those related to the same object (anonymity and unlinkability).
Background
In oppressive political environments, people use pseudonyms to make public political statements and to hide the identities of their correspondents. In more tolerant environments, people use pseudonyms to avoid...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–88
Chaum D (1986) Showing credentials without identification – signatures transferred between unconditionally unlinkable pseudonyms. In: Pichler F (ed) Advances in cryptology – EUROCRYPT’85. Lecture notes in computer science, vol 219. Springer, Berlin, pp 241–244
Froomkin M (1996) Flood control on the information ocean: living with anonymity, digital cash, and distributed databases. University of Pittsburgh. J Law Commerce 15:395
Mazieres D, Kaashoek F (1998) The desgin, implementation and operation of an email pseudonym server. 5th ACM conference on computer and communications security. ACM Press, New York, pp 27–36
Pfitzmann A, Köhntopp M (2001) Anonymity, unobservability, and pseudonymity—a proposal for terminology. In: Frederrath H (ed) Designing privacy enhancing technologies. Lecture in computer science, vol 2009. Springer, Berlin, pp 1–9
Rao JR, Rohatgi P (2000) Can pseudonyms really guarantee privacy? 9th Usenix Symposium, Denver, August
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Bleumer, G. (2011). Pseudonyms. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_216
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_216
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering