SlideShare una empresa de Scribd logo
1 de 28
An Introduction to Digital Identity Andreas Pfitzmann Dresden University of Technology, Department of Computer Science, D-01062 Dresden Nöthnitzer Str. 46,  Room 3071  Phone: +49 351 463-38277, e-mail:  [email_address] . tu-dresden .de ,  http://dud. inf . tu-dresden .de/ Keynote presentation at OECD Workshop on Digital Identity Management Trondheim, Norway, May 8, 2007
An Introduction to Digital Identity Digital identity  of what? is set of attributes Partial Identities (pIDs)  for privacy how to use? Attributes:  Important kinds of Possible classifications Example: How to (not) use biometrics How to represent identity online? How to manage your identity online? Identity management framework needed
Digital identity of what? ,[object Object],[object Object],[object Object],[object Object]
Digital identity is ? ,[object Object],[object Object],[object Object],[object Object]
Digital identity is ... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Partial Identities (pIDs) ,[object Object],[object Object],[object Object],[object Object]
Using pIDs requires ... ,[object Object],[object Object],[object Object],[object Object]
Important kinds of attributes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Possible classifications of attributes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How much protection for which attributes? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
An eternal core-identity attribute: Biometrics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to represent identity online? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Pseudonyms: Initial linking to holder Public pseudonym : The linking between pseudonym and its holder may be publicly known from the very beginning. Initially non-public pseudonym : The linking between pseudonym and its holder may be known by certain parties ( trustees for identity ), but is not public at least initially. Initially unlinked pseudonym : The linking between pseudonym and its holder is – at least initially – not known to anybody (except the holder). Phone number with its owner listed in public directories Bank account with bank as trustee for identity, Credit card number ... Biometric characteristics; DNA (as long as no registers)
Pseudonyms: Use in different contexts => partial order A    B stands for “B enables stronger anonymity than A” number of an identity card, social security number,  bank account pen name,  employee  identity card number customer number contract number one-time password, TAN
Trustee for values vs. Trustee for identities  ,[object Object],[object Object],[object Object],[object Object]
How to manage your identity online? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity management framework needed  ,[object Object],[object Object],[object Object],[object Object]
Further reading ,[object Object],[object Object],[object Object]
Authenticated anonymous declarations between  business partners that can be de-anonymized ¬  trusted third party  A trusted third party  B identification user  X user  Y ¬  confirmation  know document p A p G ( X , g )   p G ( X , g ) identification p G ‘ ( Y , g ) confirmation  know document p G ‘ ( Y , g ) p G ‘ ( Y , g ) p G ( X , g ) p B for for
Authenticated anonymous declarations between  business partners that can be de-anonymized ¬  trusted third party  A trusted third party  B identification user  X user  Y ¬  confirmation  know document p A p G ( X , g )   p G ( X , g ) identification p G ‘ ( Y , g ) confirmation  know document p G ‘ ( Y , g ) p G ‘ ( Y , g ) p G ( X , g ) p B for for trustees for identities
Security for completely anonymous business partners  using active trustee who can check the goods  trustee  T p T [ 2 ] ¬  customer  X merchant  Y ¬  [ 5 ] [ 3 ] p L ( Y , g ) [ 4 ] [ 1 ] p T p T delivery to trustee delivery to customer order merchant is „ money“ for merchant p L ( Y , g ) + money p K ( X , g ) order of the customer (money is deposited) checked by  T
Security for completely anonymous business partners  using active trustee who can  not  check the goods  trustee  T p T [ 2 ] ¬  customer  X merchant  Y ¬  [ 5 ] [ 3 ] p L ( Y , g ) [ 4 ] [ 1 ] p T p T delivery to trustee delivery to customer order delivery is „ money“ for distributor p L ( Y , g ) + money p K ( X , g ) order of the customer (money is deposited) checked by  T [4.1] wait
Security for completely anonymous business partners  using active trustee who can  (not)  check the goods trustee for values  trustee  T p T [ 2 ] ¬  customer  X merchant  Y ¬  [ 5 ] [ 3 ] p L ( Y , g ) [ 4 ] [ 1 ] p T p T delivery to trustee delivery to customer order delivery is „ money“ for distributor p L ( Y , g ) + money p K ( X , g ) order of the customer (money is deposited) checked by  T ([4.1] wait)
Personal identifier 845 authorizes A: ___ A notifies 845: ___ 845 pays B  € B certifies 845: ___ C pays 845  €
Role-relationship and transaction pseudonyms 762 authorizes A: __ A notifies 762: ___ 451 pays B  € B certifies 451: ___ B certifies 314: ___ C pays 314  €
Encryption in layer models In the OSI model it holds:  Layer  n  doesn’t have to look at Data Units (DUs) of layer  n +1 to perform its service. So layer  n +1 can deliver  ( n +1)-DUs encrypted to layer  n . For packet-oriented services, the layer  n  typically furnishes the ( n +1)-DUs with a  n -header and possibly with an  n -trailer, too, and delivers this as  n -DU to layer  n -1. This can also be done encrypted again. and so on. All encryptions are independent with respect to both the encryption systems and the keys. layer  n +1 layer  n layer  n -1 ( n +1)-DU n -DU ( n -1)-DU n -header n - trailer encryption encryption
Arranging it into the OSI layers (1) link encryption link encryption user station user station exchange exchange 0 medium 1 physical 2 data link 3 network 4 transport 5 session 6 presentation 7 application OSI layers link encryption end-to-end encryption link encryption end-to-end encryption
Arranging it into the OSI layers (2) query and superpose addressing implicit query addressing channel selection ring 0 medium digital signal regeneration superpose keys and messages 1 physical anonymous access anonymous access 2 data link buffer and  re-encrypt broad-cast 3 network implicit 4 transport 5 session 6 presentation 7 application RING-network DC-network MIX-network broadcast OSI layers has to preserve anonymity against the communication partner has to preserve anonymity end-to-end encryption realizable without consideration of anonymity

Más contenido relacionado

Destacado

Privacy and identity management for everyone
Privacy and identity management for everyonePrivacy and identity management for everyone
Privacy and identity management for everyone
Amir Neziri
 
The Rise of the Platform Marketer: Connected CRM in a Digital World
The Rise of the Platform Marketer: Connected CRM in a Digital WorldThe Rise of the Platform Marketer: Connected CRM in a Digital World
The Rise of the Platform Marketer: Connected CRM in a Digital World
Argyle Executive Forum
 

Destacado (7)

Ganji-ID-5305
Ganji-ID-5305Ganji-ID-5305
Ganji-ID-5305
 
Privacy and identity management for everyone
Privacy and identity management for everyonePrivacy and identity management for everyone
Privacy and identity management for everyone
 
Digital Marketing Platform
Digital Marketing PlatformDigital Marketing Platform
Digital Marketing Platform
 
Personalisation in the Open Marketing Cloud
Personalisation in the Open Marketing CloudPersonalisation in the Open Marketing Cloud
Personalisation in the Open Marketing Cloud
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
 
The Rise of the Platform Marketer: Connected CRM in a Digital World
The Rise of the Platform Marketer: Connected CRM in a Digital WorldThe Rise of the Platform Marketer: Connected CRM in a Digital World
The Rise of the Platform Marketer: Connected CRM in a Digital World
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoT
 

Similar a Trondheim20070508_OECDf

Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Market Engel SAS
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 
Dictao Company Brochure
Dictao Company BrochureDictao Company Brochure
Dictao Company Brochure
Dictao
 

Similar a Trondheim20070508_OECDf (20)

Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-Security
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdfDemystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
 
Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Dictao Company Brochure
Dictao Company BrochureDictao Company Brochure
Dictao Company Brochure
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspective
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Digital Trust and the Identity of things
Digital Trust and the Identity of thingsDigital Trust and the Identity of things
Digital Trust and the Identity of things
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Network security unit 4,5,6
Network security unit 4,5,6 Network security unit 4,5,6
Network security unit 4,5,6
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Trondheim20070508_OECDf

  • 1. An Introduction to Digital Identity Andreas Pfitzmann Dresden University of Technology, Department of Computer Science, D-01062 Dresden Nöthnitzer Str. 46, Room 3071 Phone: +49 351 463-38277, e-mail: [email_address] . tu-dresden .de , http://dud. inf . tu-dresden .de/ Keynote presentation at OECD Workshop on Digital Identity Management Trondheim, Norway, May 8, 2007
  • 2. An Introduction to Digital Identity Digital identity of what? is set of attributes Partial Identities (pIDs) for privacy how to use? Attributes: Important kinds of Possible classifications Example: How to (not) use biometrics How to represent identity online? How to manage your identity online? Identity management framework needed
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Pseudonyms: Initial linking to holder Public pseudonym : The linking between pseudonym and its holder may be publicly known from the very beginning. Initially non-public pseudonym : The linking between pseudonym and its holder may be known by certain parties ( trustees for identity ), but is not public at least initially. Initially unlinked pseudonym : The linking between pseudonym and its holder is – at least initially – not known to anybody (except the holder). Phone number with its owner listed in public directories Bank account with bank as trustee for identity, Credit card number ... Biometric characteristics; DNA (as long as no registers)
  • 14. Pseudonyms: Use in different contexts => partial order A    B stands for “B enables stronger anonymity than A” number of an identity card, social security number, bank account pen name, employee identity card number customer number contract number one-time password, TAN
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Authenticated anonymous declarations between business partners that can be de-anonymized ¬  trusted third party A trusted third party B identification user X user Y ¬  confirmation know document p A p G ( X , g )   p G ( X , g ) identification p G ‘ ( Y , g ) confirmation know document p G ‘ ( Y , g ) p G ‘ ( Y , g ) p G ( X , g ) p B for for
  • 20. Authenticated anonymous declarations between business partners that can be de-anonymized ¬  trusted third party A trusted third party B identification user X user Y ¬  confirmation know document p A p G ( X , g )   p G ( X , g ) identification p G ‘ ( Y , g ) confirmation know document p G ‘ ( Y , g ) p G ‘ ( Y , g ) p G ( X , g ) p B for for trustees for identities
  • 21. Security for completely anonymous business partners using active trustee who can check the goods  trustee T p T [ 2 ] ¬  customer X merchant Y ¬  [ 5 ] [ 3 ] p L ( Y , g ) [ 4 ] [ 1 ] p T p T delivery to trustee delivery to customer order merchant is „ money“ for merchant p L ( Y , g ) + money p K ( X , g ) order of the customer (money is deposited) checked by T
  • 22. Security for completely anonymous business partners using active trustee who can not check the goods  trustee T p T [ 2 ] ¬  customer X merchant Y ¬  [ 5 ] [ 3 ] p L ( Y , g ) [ 4 ] [ 1 ] p T p T delivery to trustee delivery to customer order delivery is „ money“ for distributor p L ( Y , g ) + money p K ( X , g ) order of the customer (money is deposited) checked by T [4.1] wait
  • 23. Security for completely anonymous business partners using active trustee who can (not) check the goods trustee for values  trustee T p T [ 2 ] ¬  customer X merchant Y ¬  [ 5 ] [ 3 ] p L ( Y , g ) [ 4 ] [ 1 ] p T p T delivery to trustee delivery to customer order delivery is „ money“ for distributor p L ( Y , g ) + money p K ( X , g ) order of the customer (money is deposited) checked by T ([4.1] wait)
  • 24. Personal identifier 845 authorizes A: ___ A notifies 845: ___ 845 pays B € B certifies 845: ___ C pays 845 €
  • 25. Role-relationship and transaction pseudonyms 762 authorizes A: __ A notifies 762: ___ 451 pays B € B certifies 451: ___ B certifies 314: ___ C pays 314 €
  • 26. Encryption in layer models In the OSI model it holds: Layer n doesn’t have to look at Data Units (DUs) of layer n +1 to perform its service. So layer n +1 can deliver ( n +1)-DUs encrypted to layer n . For packet-oriented services, the layer n typically furnishes the ( n +1)-DUs with a n -header and possibly with an n -trailer, too, and delivers this as n -DU to layer n -1. This can also be done encrypted again. and so on. All encryptions are independent with respect to both the encryption systems and the keys. layer n +1 layer n layer n -1 ( n +1)-DU n -DU ( n -1)-DU n -header n - trailer encryption encryption
  • 27. Arranging it into the OSI layers (1) link encryption link encryption user station user station exchange exchange 0 medium 1 physical 2 data link 3 network 4 transport 5 session 6 presentation 7 application OSI layers link encryption end-to-end encryption link encryption end-to-end encryption
  • 28. Arranging it into the OSI layers (2) query and superpose addressing implicit query addressing channel selection ring 0 medium digital signal regeneration superpose keys and messages 1 physical anonymous access anonymous access 2 data link buffer and re-encrypt broad-cast 3 network implicit 4 transport 5 session 6 presentation 7 application RING-network DC-network MIX-network broadcast OSI layers has to preserve anonymity against the communication partner has to preserve anonymity end-to-end encryption realizable without consideration of anonymity