Home

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms

Authors: David L. Chaum

Date: 1981

Link: PDF


A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication--in spite of an unsecured underlying telecommunication system.

The technique does not require a universally trusted authority. One correspondent can remain anonymous to a second, while allowing the second to respond via an untraceble return address.

  1. Cryptology is the science of secret communication.
  2. Public key cryptography is a solution to the key distribution problem — the problem of providing each communicant with a secret key.
  3. Another cryptographic problem is the traffic analysis problem — the problem of keeping confidential who converses with whom, and when they converse.
  4. This paper presents a solution to the traffic analysis problem that is based on public key cryptography.
  5. A pair of keys K and K⁻¹ is created from a suitable randomly generated seed:
  6. K(X) = The encryption of X with key K — It's just the image of X under the mapping implemented by the cryptographic algorithm using key K.
  7. Keys are inverses:

    K⁻¹(K(X)) = K(K⁻¹(X)) = X

  8. A message X is sealed with a public key K so that only the holder of the private key K⁻¹ can discover its content.
  9. If X is simply encrypted with K, then anyone could verify a guess that Y = X by checking whether K(Y) = K(X):
  10. Assumptions:
  11. Mails are sent to a mix, instead of directly to the recipient:
  12. One mix protocol:
  13. Cascade mix protocol:
  14. The purpose of a mix is to hide the correspondences between the items in its input and those in its output:
  15. A mix can change its public key by announcing the new key in a statement signed with its old private key.
  16. A solution for the recipient (named x) to respond to the sender (named y) while keeping the identity of the x a secret from the y:
  17. Digital Pseudonyms:

    A digital pseudonym is a public key used to verify signatures made by the anonymous holder of the corresponding private key. A roster, or list of pseudonyms, is created by an authority that decides which applications for pseudonyms to accept, but is unable to trace the pseudonyms in the completed roster.
    The applications may be sent to the authority anonymously, by untraceable mail, for example, or they may be provided in some other way.

  18. Solutions to potential issues:
  19. The rest of the paper focuses on how the performance of the mailing system can be optimized/improved.