Implementing Pseudonymity

I will give an overview of some technologies that enable pseudonymity - allowing individuals to reveal or prove information about themselves to others without revealing their full identity. I will describe some functionalities relating to pseudonymity that can be implemented, and some that cannot. M...

Full description

Bibliographic Details
Main Author: Miranda Mowbray
Format: Article
Language:English
Published: University of Edinburgh 2006-03-01
Series:SCRIPTed: A Journal of Law, Technology & Society
Online Access:http://www.law.ed.ac.uk/ahrb/script-ed/vol3-1/mowbray.asp
id doaj-244a5b64b0a041dbbcfa2deeb0518f4a
record_format Article
spelling doaj-244a5b64b0a041dbbcfa2deeb0518f4a2020-11-25T02:47:27ZengUniversity of EdinburghSCRIPTed: A Journal of Law, Technology & Society1744-25672006-03-01313444Implementing PseudonymityMiranda MowbrayI will give an overview of some technologies that enable pseudonymity - allowing individuals to reveal or prove information about themselves to others without revealing their full identity. I will describe some functionalities relating to pseudonymity that can be implemented, and some that cannot. My intention is to present enough of the mathematics that underlies technology for pseudonymity to show that it is indeed possible to implement some functionalities that at first glance may appear impossible. In particular, I will show that several of the intended functions of the UK national ID could be provided in a pseudonymous fashion, allowing greater privacy. I will also outline some technology developed at HP Labs which ensures that users’ personal data is released only to software that has been checked to conform to their preferred privacy policies.http://www.law.ed.ac.uk/ahrb/script-ed/vol3-1/mowbray.asp
collection DOAJ
language English
format Article
sources DOAJ
author Miranda Mowbray
spellingShingle Miranda Mowbray
Implementing Pseudonymity
SCRIPTed: A Journal of Law, Technology & Society
author_facet Miranda Mowbray
author_sort Miranda Mowbray
title Implementing Pseudonymity
title_short Implementing Pseudonymity
title_full Implementing Pseudonymity
title_fullStr Implementing Pseudonymity
title_full_unstemmed Implementing Pseudonymity
title_sort implementing pseudonymity
publisher University of Edinburgh
series SCRIPTed: A Journal of Law, Technology & Society
issn 1744-2567
publishDate 2006-03-01
description I will give an overview of some technologies that enable pseudonymity - allowing individuals to reveal or prove information about themselves to others without revealing their full identity. I will describe some functionalities relating to pseudonymity that can be implemented, and some that cannot. My intention is to present enough of the mathematics that underlies technology for pseudonymity to show that it is indeed possible to implement some functionalities that at first glance may appear impossible. In particular, I will show that several of the intended functions of the UK national ID could be provided in a pseudonymous fashion, allowing greater privacy. I will also outline some technology developed at HP Labs which ensures that users’ personal data is released only to software that has been checked to conform to their preferred privacy policies.
url http://www.law.ed.ac.uk/ahrb/script-ed/vol3-1/mowbray.asp
work_keys_str_mv AT mirandamowbray implementingpseudonymity
_version_ 1724753433679888384