2011
DOI: 10.1007/978-3-642-22890-2_10
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized Generation of Multiple, Uncorrelatable Pseudonyms without Trusted Third Parties

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…As stated in [24], when designing such a decentralised approach for pseudonym generation, we are mainly interested in fulfilling the following requirements: i) ease of use, ii) linking a pseudonym to its owning user should not be possible for any other than the user herself, unless it is explicitly permitted, iii) in cases that users may have multiple pseudonyms, it should not be possible to identify different pseudonyms as belonging to the same user, iv) injectivity, in terms that the pseudonym generation process should avoid duplicates, v) flexibility, i.e. it should be possible to add new pseudonyms to the user entities with minimal effort.…”
Section: Introductionmentioning
confidence: 88%
See 3 more Smart Citations
“…As stated in [24], when designing such a decentralised approach for pseudonym generation, we are mainly interested in fulfilling the following requirements: i) ease of use, ii) linking a pseudonym to its owning user should not be possible for any other than the user herself, unless it is explicitly permitted, iii) in cases that users may have multiple pseudonyms, it should not be possible to identify different pseudonyms as belonging to the same user, iv) injectivity, in terms that the pseudonym generation process should avoid duplicates, v) flexibility, i.e. it should be possible to add new pseudonyms to the user entities with minimal effort.…”
Section: Introductionmentioning
confidence: 88%
“…Therefore, the new pseudonymisation technique satisfies the properties described in [24] (implementation issues will be subsequently analysed), enriched with some additional properties that may be of high importance in specific scenarios, as discussed next. Actually, due to the property P3, the user A may prove, if she wants, that two different pseudonyms P (1)…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…FHIR-DIET allows users to choose among several cryptographic schemes, all of which offer a perfectly hiding property and can be fed to the tool through the configuration files. In particular, following the guidelines [14], the choice is around literature approaches based on asymmetric cryptographic algorithms (e.g., [40]) or more recent approaches based on cryptographic accumulators for pseudonym generation [41], which inherits the security properties of a Merkle tree (also envisioned by the recent ENISA report [15]) achieving post-quantum security. The reference is the ENISA best practices [14] and techniques [15] and the ISO 25237 standard on pseudonymisation and specifically the Clause 6 [16].…”
Section: ) Pseudonymisation and De-pseudonymisationmentioning
confidence: 99%