scispace - formally typeset
Open AccessJournal ArticleDOI

Untraceable electronic mail, return addresses, and digital pseudonyms

David Chaum
- 01 Feb 1981 - 
- Vol. 24, Iss: 2, pp 84-90
TLDR
A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.
Abstract
A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system. The technique does not require a universally trusted authority. One correspondent can remain anonymous to a second, while allowing the second to respond via an untraceable return address. The technique can also be used to form rosters of untraceable digital pseudonyms from selected applications. Applicants retain the exclusive ability to form digital signatures corresponding to their pseudonyms. Elections in which any interested party can verify that the ballots have been properly counted are possible if anonymously mailed ballots are signed with pseudonyms from a roster of registered voters. Another use allows an individual to correspond with a record-keeping organization under a unique pseudonym, which appears in a roster of acceptable clients.

read more

Content maybe subject to copyright    Report

Untraceable Electronic Mail, Return
Addresses, and Digital Pseudonyms
By David Chaum
Communications of the ACM
February 1981
Volume 24
Number 2
---------------------------------------------------------------------------
Permission to copy without fee all or part of this material is granted
provided that the copies are not made or distributed for direct
commercial advantage, the ACM copyright notice and the title of the
publication and its date appear, and notice is given that copying is
by permission of the Association for Computing Machinery. To copy
otherwise, or to republish, requires a fee and/or specific permission.
This work was partially supported by the National Science Foundation
under Grant MCS 75-23739 and by teh Air Force Office of Scientific
Research under Contract F49620-9-CO173.
Author's present address: Computer Science Division, Electrical
Engineering and Computer Sciences Department, University of
California, Berkeley, California 94720. (415)42-1024.
Copyright (C) 1981 ACM 0001-082/81/0200-0084 $00.75.
---------------------------------------------------------------------------
Technical Note
Programming Techniques and Data Structures
R. Rivest, Editor
---------------------------------------------------------------------------
Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms
David L. Chaum
University of California, Berkeley
Abstract
A technique based on public key cryptography is presented that allows
an electronic mail system to hide who a participant communicates with
as well as the content of the communication - in spite of an unsecured
underlying telecommunication system. The technique does not require a
universally trusted authority. One correspondent can remain anonymous
to a second, while allowing the second to respond via an untraceable
return address.
The technique can also be used to form rosters of untraceable digital
pseudonyms from selected applications. Applicants retain the
exclusive ability to form digital signatures corresponding to their
pseudonyms. Elections in which any interested party can verify that
the ballots have been properly counted are possible if anonymously
mailed ballots are signed with pseudonyms from a roster of registered
voters. Another use allows an individual to correspond witha
record-keeping organization under a unique pseudonym which appears in
a roster of acceptable clients.

Key Words and Phrases: electronic mail, public key cryptosystems,
digital signatures, traffic analysis, security, privacy
CR Categories: 2.12, 3.81
Introduction
Cryptology is the science of secret communication. Cryptographic
techniques have been providing secrecy of message content for
thousands of years [3]. Recently some new solutions to the "key
distribution problem" (the problem of providing each communicant with
a secret key) have been suggested [2,4], under the name of public key
cryptography. Another cryptographic problem, "the traffic analysis
problem" (the problem of keeping confidential who converses with whom,
and when they converse), will become increasingly important with the
growth of electronic mail. This paper presents a solution to the
traffic analysis problem that is based on public key cryptography.
Baran has solved the traffic analysis problem for networks [1], but
requires each participant to trust a common authority. In contrast,
systems based on the solution advanced here can be compromised only by
subversion or conspiracy of all of a set of authorities. Ideally,
each participant is an authority.
The following two sections introduce the notation and assumptions.
Then the basic concepts are introduced for some special cases
involving a series of one or more authorities. The final section
covers general purpose mail networks.
Notation
Someone becomes a user of a public key cryptosystem (like that of
Rivest, Shamir, and Adleman [5]) by creating a pair of keys K and
Inv(K) from a suitable randomly generated seed. The public key
K is made known to the other users or anyone else who cares to know
it; the private key Inv(K) is never divulged. The encryption of
X with key K will be denoted K( X ), and is just the image of X under
the mapping implemented by the cryptographic algorithm using key K.
The increased utility of these algorithms over conventional algorithms
results because the two keys are inverses of each other, in the sense
that
Inv(K)( K( X ) ) = K( Inv(K)( X ) ) = X.
A message X is "sealed" with a public key K so that only the
holder of the private key Inv(K) can discover its content. If
X is simply encrypted with K, then anyone could verify a guess
that Y = X by checking whether K( Y ) = K( X ). This threat can be
eliminated by attaching a large string of random bits R to X
before encrypting. The sealing of X with K is then denoted
K( R, X ). A user "signs" some material X by prepending a large
constant C (all zeros, for example) and then encrypting with its
private key, denoted Inv(K)( C, X ) = Y. Anyone can verify that
Y has been signed by the holder of Inv(K) and determine the
signed matter X, by forming K( Y ) = C, X and checking for C.
Assumptions

The approach taken here is based on two important assumptions:
(1) No one can determine anything about the correspondences between a
set of sealed items and the corresponding set of unsealed items, or
create forgeries without the appropriate random string or private key.
(2) Anyone may learn the origin, destination(s), and representation of
all messages in the underlying telecommunication system and anyone may
inject, remove, or modify messages.
Mail System
The users of the cryptosystem will include not only the correspondents
but a computer called a "mix" that will process each item of mail
before it is delivered. A participant prepares a message M for
delivery to a participant at address A by sealing it with the
addressee's public key Ka, appending the address A, and then
sealing the result with the mix's public key K1. The left-hand
side of the following expression denotes this item which is input to
the mix:
K1( R1, Ka( R0, M ), A ) --> Ka( R0, M ), A.
The --> denotes the transformation of the input by the mix into the
output shown on the right-hand side. The mix decrypts its input with
its private key, throws away the random string R1, and outputs the
remainder. One might imagine a mechanism that forwards the sealed
messages Ka( R0, M ) of the output to the addressees who then decrypt
them with their own private keys.
The purpose of a mix is to hide the correspondences between the items
in its input and those in its output. The order of arrival is hidden
by outputting the uniformly sized items in lexicographically ordered
batches. By assumption (1) above, there need be no concern about a
cryptanalytic attack yielding the correspondence between the sealed
items of a mix's input and its unsealed output - if items are not
repeated. However, if just one item is repeated in the input and
allowed to be repeated in the output, then the correspondence is
revealed for that item.
Thus, an important function of a mix is to ensure that no item is
processed more than once. This function can be readily achieved by a
mix for a particular batch by removing redundant copies before
outputting the batch. If a single mix is used for multiple batches,
then one way that repeats across batches can be detected is for the
mix to maintain a record of items used in previous batches. (Records
can be discarded once a mix changes its public key by, for example,
announcing the new key in a statement signed with its old private
key.) A mix need not retain previous batches if part of each random
string R1 constains something - such as a time-stamp - that is only
valid for a particular batch.
If a participant gets signed receipts for messages it submits to a
mix, then the participant can provide substantial evidence that the
mix failed to output an item properly. Only a wronged participant can
supply the receipt Y (= Inv(K1)( C, K1( R1, Ka( R0, M ), A ))), the
missing output X (= Ka( R0, M ), A ), and the retained string R1, such
that K1( Y ) = C, K1( R1, X ). Becasue a mix will sign each output
batch as a whole, the absence of an item X from a batch can be
substantiated by a copy of the signed batch.
The use of a "cascade", or series of mixes, offers the advantage that
any single constituent mix is able to provide the secrecy of the

correspondence between the inputs and the outputs of the entire
cascade. Incrimination of a particular mix of a cascade that failed
to properly process an item is accomplished as with a single mix, but
only requires a receipt from the first mix of the cascade, since a mix
can use the signed output of its predecessor to show the absence of an
item from its own input. An item is prepared for a cascade of n mixes
the same as for a single mix. It is then successively sealed for each
succeeding mix:
Kn( Rn, K<n-1>( R<n-1>, ... , K2( R2, K1( R1, Ka( R0, M ), A ))...)) -->.
The fist mix yields a lexicographically ordered batch of items, each
of the form
K<n-1>( R<n-1>, ... , K2( R2, K1( R1, Ka( R0, M ), A ))...) -->.
The items in the final output batch of a cascade are of the form
Ka( R0, M ), A, the same as those of a single mix.
Return Addresses
The techniques just described allow participant x to send anonymous
messages to participant y. What is needed now is a way for y to
respond to x while still keeping the identity of x secret from y. A
solution is for x to form an untraceable return address
K1( R1, Ax), Kx, where Ax is its own real address, Kx is a public key
chosen for the occasion, and R1 is a key that will also act as a
random string for purposes of sealing. Then, x can send this return
address to y as part of a message sent by the techniques already
described. (In general, two participants can exchange return
addresses through a chain of other participants, where at least one
member of each adjacent pair knows the identity of the other member of
the pair.) The following indicates how y uses this untraceable return
address to form a response to x, via a new kind of mix:
K1( R1, Ax ), Kx( R0, M ) --> Ax, R1( Kx( R0, M )).
This mix uses the string of bits R1 that it finds after decrypting the
address part K1( R1, Ax ) as a key to re-encrypt the message part
Kx( R0, M ). Only the addressee x can decrypt the resulting output
because x created both R1 and Kx. The mix must not allow address
parts to be repeated - for the same reason that items of regular mail
must not be repeated. This means that x must supply y with a return
address for each item of mail x wishes to receive. Also notice that
conventional as opposed to public key cryptography could be used for
both encryptions of M.
With a cascade of mixes, the message part is prepared the same as for
a single mix, and the address part is as showin in the following
input:
K1( R1, K2( R2, ..., K<n-1>( R<n-1>, Kn( Rn, Ax ))...)), Kx( R0, M ) -->.
The result of the first mix is
K2( R2, ..., K<n-1>( R<n-1>, Kn( Rn, Ax ))...), R1( Kx( R0, M )) -->,
and the final result of the remaining n-1 mixes is
Ax, Rn( R<n-1> ... R2( R1( Kx( R0, M )))...).
Untraceable return addresses allow the possiblity of "certified" mail:
They can provide the sender of an anonymous letter with a receipt

attesting to the fact that the letter appeared intact in the final
output batch. The address A that is incorporated into a certified
letter is expanded to include not only the usual address of the
recipient, but also an untraceable return address for the sender.
When this return address appears inthe output batch of the final mix,
it is used to mail the sender a signed receipt which inlucdes the
message as well as the address to which it was delivered. The receipt
might be signed by each mix.
Digital Pseudonyms
A digital "pseudonym" is a public key used to verify signatures made
by the anonymous holder of the corresponding private key. A "roster",
or list of pseudonyms, is created by an authority that decides which
applications for pseudonyms to accept, but is unable to trace the
pseudonyms in the completed roster. The applications may be sent to
the authority anonymously, by untraceable mail, for example, or they
may be provided in some other way.
Each application received by the authority contains all the
information required for the acceptance decision and a special
unaddressed digital letter (whose messages is the public key K, the
applicant's proposed pseudonym.) In the case of a single mix, these
letters are of the form K1( R1, K ). For a cascade of n mixes, they
are of the form Kn( Rn, ..., K2( R2, K1( R1, K ))...). The authority
will form an input batch containing only those unaddressed letters
from the applications it accepts. This input batch will be supplied
to a special cascade whose final output batch will be publically
available. Since each entry in the final output batch of the cascade
is a public key K from an accepted applicant, the signed output of the
final mix is a roster of digital pseudonyms.
Notification of applicants can be accomplished by also forming a
roster for unaccepted applications and then using the technique of
certified mail to return a single batch of receipts to both sets of
applicants. Of course, repeats must not be allowed within or across
batches.
If only registered voters are accepted for a particular roster, then
it can be used to carry out an election. For a single mix, each voter
submits a ballot of the form K1( R1, K, Inv(K)( C, V )), where K is
the voter's pseudonym and V is the actual vote. For a cascade of
mixes, ballots are of the form
Kn( Rn, ..., K2( R2, K1( R1, K, Inv(K)( C, V )))...). The ballots
must be processed as a single batch, as were the letters used to form
rosters. Items in the final lexicographically ordered output batch
are of the form K, Inv(K)( C, V ). Since the roster of registered
voters is also ordered on K, it is easy for anyone to count the votes
by making a single pass through both batches at once. Each ballot is
counted only after checking that the pseudonym K which forms its
prefix, is also contained in the roster and that the pseudonym
properly decrypts the signed vote V.
An individual might be known to an organization only by a pseudonym
that appears in a roster of acceptable clients. Clients can
correspond with the organization via untraceable mail and the
organization can correspond with the clients using untraceable return
addresses. If applicants identify themselves in their applications,
or if they sign applications with pseudonyms that appear in a roster
issued by an authority that requires identification, then the
organization is assured that the same client cannot come to it under
different pseudonyms. Under special circumstances, such as default of
payment, a particular pseudonym could be shown to correspond to a

Citations
More filters
Journal ArticleDOI

Design science in information systems research

TL;DR: The objective is to describe the performance of design-science research in Information Systems via a concise conceptual framework and clear guidelines for understanding, executing, and evaluating the research.
Book ChapterDOI

The Sybil Attack

TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
ReportDOI

Tor: the second-generation onion router

TL;DR: This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points.
Journal ArticleDOI

Information hiding-a survey

TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Patent

System for generation of user profiles for a system for customized electronic identification of desirable objects

TL;DR: In this article, the authors proposed a system that automatically constructs a target profile for each target object in the electronic media based on the frequency with which each word appears in an article relative to its overall frequency of use in all articles, as well as a "target profile interest summary" for each user.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

Secure communications over insecure channels

TL;DR: This paper shows that it is possible to select a key over open communications channels in such a fashion that communications security can be maintained, and describes a method which forces any enemy to expend an amount of work which increases as the square of the work required of the two communicants to select the key.
BookDOI

On distributed communications: ix. security, secrecy, and tamper-free considerations,

Paul Baran
TL;DR: The premise that the existence of ''spies'' within the supposedly secure system must be anticipated is evaluated, and the safeguards to be built into the network are described.
Frequently Asked Questions (1)
Q1. What are the contributions in this paper?

A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication in spite of an unsecured underlying telecommunication system. The technique does not require a universally trusted authority.