Certified pseudonyms colligated with master secret key

Vijayakrishnan Pasupathinathan*, Josef Pieprzyk, Huaxiong Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review


A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudonym can interact with an unknown entity and be confident that his/her identity is secret even if the other entity is dishonest. In this work, we present a system that allows users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Our proposal is different from previously published pseudonym systems, as in addition to standard notion of protecting privacy of an user, our system offers colligation between seemingly independent pseudonyms. This new property when combined with a trusted platform that stores a master secret key is extremely beneficial to an user as it offers a convenient way to generate a large number of pseudonyms using relatively small storage.

Original languageEnglish
Title of host publicationSECRYPT 2009 - International Conference on Security and Cryptography, Proceedings
EditorsEduardo Fernández-Medina, Manu Malek, Javier Hernando
Place of PublicationSetúbal, Portugal
Number of pages8
ISBN (Print)9789896740054
Publication statusPublished - 2009
EventSECRYPT 2009 - International Conference on Security and Cryptography - Milan, Italy
Duration: 7 Jul 20097 Oct 2009


OtherSECRYPT 2009 - International Conference on Security and Cryptography


Dive into the research topics of 'Certified pseudonyms colligated with master secret key'. Together they form a unique fingerprint.

Cite this