2021
DOI: 10.1007/978-3-030-76663-4_5
|View full text |Cite
|
Sign up to set email alerts
|

User-Generated Pseudonyms Through Merkle Trees

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…FHIR-DIET allows users to choose among several cryptographic schemes, all of which offer a perfectly hiding property and can be fed to the tool through the configuration files. In particular, following the guidelines [14], the choice is around literature approaches based on asymmetric cryptographic algorithms (e.g., [40]) or more recent approaches based on cryptographic accumulators for pseudonym generation [41], which inherits the security properties of a Merkle tree (also envisioned by the recent ENISA report [15]) achieving post-quantum security. The reference is the ENISA best practices [14] and techniques [15] and the ISO 25237 standard on pseudonymisation and specifically the Clause 6 [16].…”
Section: ) Pseudonymisation and De-pseudonymisationmentioning
confidence: 99%
“…FHIR-DIET allows users to choose among several cryptographic schemes, all of which offer a perfectly hiding property and can be fed to the tool through the configuration files. In particular, following the guidelines [14], the choice is around literature approaches based on asymmetric cryptographic algorithms (e.g., [40]) or more recent approaches based on cryptographic accumulators for pseudonym generation [41], which inherits the security properties of a Merkle tree (also envisioned by the recent ENISA report [15]) achieving post-quantum security. The reference is the ENISA best practices [14] and techniques [15] and the ISO 25237 standard on pseudonymisation and specifically the Clause 6 [16].…”
Section: ) Pseudonymisation and De-pseudonymisationmentioning
confidence: 99%
“…Initially studied mainly in the context of computer and network security, privacy engineering has emerged not only as an important research field per se [3], but also as a growing market, fuelled by the compliance needs of organisations, as well as the increasing awareness and demands of users. Beyond cryptography and legacy security technologies, various research areas have spawned, including pseudonymisation [4], anonymisation [5], privacyaware access control [6], differential privacy [7], privacy assessment [8], location privacy [9], privacy-preserving data analysis [10], and users rights' enforcement [11], among others, whereas in the Business Process Management (BPM) domain, most privacy-related research has focused on the annotation of processes and workflows with authorisation constraints and/or other data protection concerns (e.g., [12] [13]). The protection of privacy -and compliance thereof-is also the focus of several European projects, among which BPR4GDPR, together comprising the "GDPR Cluster", and proposing complementary solutions [14].…”
Section: Related Workmentioning
confidence: 99%