Receiver anonymity via Incomparable Public Keys

Brent R. Waters, Edward W. Felten, Amit Sahai

Research output: Contribution to journalConference articlepeer-review

28 Scopus citations


We describe a new method for protecting the anonymity of message receivers in an untrusted network. Surprisingly, existing methods fail to provide the required level of anonymity for receivers (although those methods do protect sender anonymity). Our method relies on the use of multicast, along with a novel cryptographic primitive that we call an Incomparable Public Key cryptosystem, which allows a receiver to efficiently create many anonymous "identities" for itself without divulging that these separate "identities" actually refer to the same receiver, and without increasing the receiver's workload as the number of identities increases. We describe the details of our method, along with a prototype implementation.

Original languageEnglish (US)
Pages (from-to)112-121
Number of pages10
JournalProceedings of the ACM Conference on Computer and Communications Security
StatePublished - 2003
EventProceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003 - Washington, DC, United States
Duration: Oct 27 2003Oct 31 2003

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications


  • Anonymity
  • PGP
  • Privacy
  • Public Key Cryptography


Dive into the research topics of 'Receiver anonymity via Incomparable Public Keys'. Together they form a unique fingerprint.

Cite this