A system and associated protocols for communication between two entities across
a computer network operate such that the identities of the two entities remain
concealed from each other, while ensuring that no third party is able to trace
the existence of a conversation between them. The two entities correspond to each
other through pseudonyms. The protocols are designed with an object to distribute
trust so that an identity is not revealed by the compromise of any one agent involved
in the execution of the protocol. No one agent can establish a correlation between
a pseudonym and a physical address.