SECURITY WITHOUT IDENTIFICATION: TRANSACTION SYSTEMS TO MAKE BIG BROTHER OBSOLETE

SECURITY WITHOUT IDENTIFICATION: TRANSACTION SYSTEMS TO MAKE BIG BROTHER OBSOLETE

October 1985 | DAVID CHAUM
The future of large-scale automated transaction systems can be designed to protect individual and organizational privacy and security. Current systems allow organizations to track individuals' data, leading to potential misuse and loss of control for individuals. A new approach using digital pseudonyms and cryptographic techniques offers a solution to these issues. In this new approach, individuals use unique pseudonyms for each organization, ensuring that their identities are not directly linked. These pseudonyms are not tied to personal information, and individuals can control their use. Transactions are conducted using personal card computers, which allow individuals to authenticate transactions without revealing sensitive information. These card computers are secure and can be used for various transactions, including communication, payment, and credential transfers. The new approach provides unconditional untraceability, meaning that even if all organizations and communication lines are monitored, they cannot link pseudonyms. This is achieved through cryptographic techniques that ensure the security of transactions. Digital signatures are used to prevent individuals from disavowing messages, ensuring that the origin of messages can be verified. In payment transactions, the new approach allows for untraceable payments, ensuring that individuals' financial information remains private. This is achieved through blind signatures, which allow individuals to make payments without revealing their identity. The system also prevents the misuse of payment data, ensuring that individuals' financial information is not misused. In credential transactions, the new approach allows individuals to show credentials without revealing unnecessary information. This is achieved through the use of pseudonyms and cryptographic techniques that ensure the privacy of individuals' data. The system also prevents the misuse of credentials, ensuring that individuals' information is not misused. The new approach provides a secure and practical solution to the issues of privacy and security in transaction systems. It allows individuals to maintain control over their data while ensuring the security of transactions. The use of digital pseudonyms and cryptographic techniques ensures that individuals' data remains private and secure. The system is designed to be practical and effective, providing a solution to the issues of privacy and security in transaction systems.The future of large-scale automated transaction systems can be designed to protect individual and organizational privacy and security. Current systems allow organizations to track individuals' data, leading to potential misuse and loss of control for individuals. A new approach using digital pseudonyms and cryptographic techniques offers a solution to these issues. In this new approach, individuals use unique pseudonyms for each organization, ensuring that their identities are not directly linked. These pseudonyms are not tied to personal information, and individuals can control their use. Transactions are conducted using personal card computers, which allow individuals to authenticate transactions without revealing sensitive information. These card computers are secure and can be used for various transactions, including communication, payment, and credential transfers. The new approach provides unconditional untraceability, meaning that even if all organizations and communication lines are monitored, they cannot link pseudonyms. This is achieved through cryptographic techniques that ensure the security of transactions. Digital signatures are used to prevent individuals from disavowing messages, ensuring that the origin of messages can be verified. In payment transactions, the new approach allows for untraceable payments, ensuring that individuals' financial information remains private. This is achieved through blind signatures, which allow individuals to make payments without revealing their identity. The system also prevents the misuse of payment data, ensuring that individuals' financial information is not misused. In credential transactions, the new approach allows individuals to show credentials without revealing unnecessary information. This is achieved through the use of pseudonyms and cryptographic techniques that ensure the privacy of individuals' data. The system also prevents the misuse of credentials, ensuring that individuals' information is not misused. The new approach provides a secure and practical solution to the issues of privacy and security in transaction systems. It allows individuals to maintain control over their data while ensuring the security of transactions. The use of digital pseudonyms and cryptographic techniques ensures that individuals' data remains private and secure. The system is designed to be practical and effective, providing a solution to the issues of privacy and security in transaction systems.
Reach us at info@study.space