Title: Is that you? Authentication in a network without identities

Authors: Taehwan Choi; H.B. Acharya; Mohamed G. Gouda

Addresses: Department of Computer Science, University of Texas at Austin, Austin 78712, Texas, USA. ' Department of Computer Science, University of Texas at Austin, Austin 78712, Texas, USA. ' National Science Foundation, Arlington, Virginia, 22230, USA; University of Texas at Austin, Austin 78712, Texas, USA

Abstract: Most networks require that their users have 'identities', i.e., have names that are fixed for a relatively long time, unique, and have been approved by a central authority (in order to guarantee their uniqueness). Unfortunately, this requirement, which was introduced to simplify the design of networks, has its own drawbacks. First, this requirement can lead to the loss of anonymity of communicating users. Second, it can allow the possibility of identity theft. Third, it can lead some users to trust other users who may not be trustworthy. In this paper, we argue that networks can be designed without user identities and their drawbacks.

Keywords: identity; anonymous communication; authentication; anonymity; trust; user identities.

DOI: 10.1504/IJSN.2011.045226

International Journal of Security and Networks, 2011 Vol.6 No.4, pp.181 - 190

Published online: 31 Jan 2012 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article