Anonymity describes the state of being unknown or unacknowledged.
Questions tagged [anonymity]
90 questions
22
votes
3 answers
Cryptographic Challenge: How to Say Something Confidentially to Snowden?
The Snowden situation raises an intereting cryptograpic problem. At present, how can something be sent confidentially to Snowden?
Claim:
I have no particular political orientation. The above question is merely a cryptographic challenge. The meta…
Pigmann
- 421
- 2
- 7
8
votes
1 answer
Anonymous trust/reputation system
Suppose there are 3 persons, Alice, Bob and Peter.
They are identified by their pseudonyms (public RSA keys).
Alice has a key Alice, Bob has Bob-Work and Bob-Friends. Peter has Peter.
Peter knows Alice. Alice expresses trust to Bob-Work.
Peter knows…
wizzard0
- 183
- 5
7
votes
2 answers
Providing tokens for anonymous survey
I want to conduct an anonymous Internet survey (e.g. “What’s your favorite fruit?” with a multiple choice answer) among a given set of people. Double answers by the same participant are not allowed.
I’m looking for a method to conduct this survey…
Alfe
- 209
- 1
- 6
6
votes
1 answer
What is the best way to pseudonymise IP addresses while retaining the ability to identify those that share a subnet?
Background: I'm developing an app that is based around registered users voting on stuff, and I want to create a heuristic that involves IP addresses as one way to flag accounts for further investigation of potential multiple account+vote abuse. In…
Inkling
- 191
- 9
6
votes
5 answers
Approach towards anonymous e-voting
I want to implement an internet-based e-voting system.
Voters shall be able to cast their vote for one out of n possible candidates. Each candidate has his own ballot-box kept by and at a trustworthy third party.
This third party is absolutely…
Thomas Lieven
- 370
- 2
- 11
6
votes
1 answer
Private Messaging
Suppose Alice and Bob wants to send messages through Sue without revealing to Eve that the exchange took place. Slightly more formally, I don't want Eve to have any advantage telling if Alice is sending spam to random recipients, or if Alice is…
Henrick Hellström
- 10,556
- 1
- 32
- 59
5
votes
2 answers
Current Status of mixnets for voting
I am currently doing some research on universally verifiable mixnets, but it seems to me that there are too few papers about them after 2006 or so and most of them come from the team of Douglas Winkstrom.
Is this correct?
Can anybody point me to…
Panagiotis Grontas
- 863
- 5
- 15
5
votes
1 answer
What are the actual anonymity features of ZCash?
I have looked at their FAQ but I didn't find the answer to this.
Having looked at their whitepaper, it seems to me that the main feature of ZCash is that you can't trace where the money came from, because of zero-knowledge proofs.
My question is,…
Gregory Magarshak
- 435
- 3
- 13
4
votes
1 answer
Can you identify the public key used to encrypt something?
If I encrypt a string with a public key, does the encrypted ciphertext reveal the public key I used to encrypt it? Basically, I don't want anyone to know who the ciphertext is addressed to.
I'm thinking about RSA, but also interested in DSA. The…
Xeoncross
- 663
- 1
- 8
- 16
4
votes
3 answers
What crypto system allows for 3 parties: Party 1 who makes an assertion, Party 2 mutates the assertion, Party 3 validates it
I'm looking for the cryptographic equivalent of a Drivers license where the issuer can be verified, the issuer doesn't need to know who you showed the drivers license to, but also allows per-transaction privacy.
I would use the standard PKI system,…
makerofthings7
- 2,631
- 1
- 22
- 37
4
votes
1 answer
Is it possible to derive an Ed25519-public-key from an Ed25519-signature?
If you have an Ed25519-signature and the signed message, can you derive the corresponding public-key or is the signature anonymous (except if you already know the public-key of course)?
K. Biermann
- 586
- 7
- 16
4
votes
1 answer
How CL-signature can act as positive & additive accumulator?
A paper (http://ieeexplore.ieee.org/abstract/document/7961987/) proposes a Braavos (adaptively sound dynamic positive accumulator).
Braavos uses two other accumulators. One is adaptively sound positive additive accumulator $ACC_A$ and the other is…
takita
- 509
- 2
- 8
4
votes
1 answer
Check if two anonymously signed messages have the same author
I need digital signature scheme with following rules:
Signature is "anonymous" which means it doesn't expose author identity (See papers in this answer. Anonymous RSA version or Boneh-Boyen algorithm satisfy this clause).
Author can create some…
marmalmad
- 41
- 2
4
votes
2 answers
Alice answering Bob without knowing the question
I'm a student and I don't know how to solve the following problem :
Alice is proposing a 10 questions list to Bob.
Bob choose only 1 question and wants to know the answer without Alice knowing the question.
Alice wants that Bob can only have 1…
Valentin Degrange
- 43
- 2
4
votes
1 answer
State of the art techniques for Anonymous Authentication?
What are the state of the art techniques for Anonymous Authentication? What are the most popular ones? The problem domain I am considering is with respect to different users accessing cloud content; lets say watching movies in Netflix. I am looking…
Usernepee
- 49
- 1