top of page

Authenticated Anonymity

Is the the seemingly paradoxical notion of  “Authenticated Anonymity” possible or is authentication essentially incompatible with anonymity?

Anonymity and specifically sender anonymity have become essential requirements for many privacy-related applications. On the other hand, anonymity may be abused for various malicious activities.

With the feature “Authenticated Anonymity” CodeB addresses both with protocols for authenticated anonymous communications channels. In those channels, the client can authenticate with the Group SSI while the latter can only authenticate the fact that an address is one of the qualified members of a defined group.

Use Cases

  • Allow a group of suppliers to pre-negotiate without revealing their identity.

  • Allow requests for GDRP critical customer information for a group of defined business partners.

"Authenticated Anonymity" is an essential building block of our Fraud Mitigation Service

bottom of page