Anonymity and cryptographic protocols

Page Content

Mikhail Atallah - CERIAS /Purdue CS Department

Jan 29, 1999

Abstract

We survey some cryptographic techniques for achieving electronic anonymity while performing useful tasks. Anonymous message broadcast, communication with untraceability of sender and receiver, foiling network traffic analysis, lead to the dining cryptographers problem and its variants. We also discuss anonymity of electronic money (i.e., without an audit trail --- unlike credit cards) and how to achieve it with cryptographic techniques like blind signatures, secret splitting, challenge-response techniques, etc. The talk is self-contained, and no previous background in this area is assumed.

About the Speaker

Mike Atallah is one of the senior professors associated with the CERIAS. He is a professor with the
CS department. He brews a potent pot of espresso.

Unless otherwise noted, the security seminar is held on Wednesdays at 4:30P.M. STEW G52, West Lafayette Campus. More information...

© 1999-2013 Purdue University. All rights reserved.

Use/Reuse Guidelines

CERIAS Seminar materials are intended for educational, non-commercial use only and any or all commercial use is prohibited. Any use must attribute "The CERIAS Seminar at Purdue University." Opinions expressed in the recordings are not necessarily representative of the views of CERIAS or of Purdue University.