Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Scalable and Efficient PKI for Inter-Organizational Communication
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
The random oracle methodology, revisited
Journal of the ACM (JACM)
Fairplay—a secure two-party computation system
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Pseudonymization for improving the Privacy in E-Health Applications
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Robust De-anonymization of Large Sparse Datasets
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
FairplayMP: a system for secure multi-party computation
Proceedings of the 15th ACM conference on Computer and communications security
Sharemind: A Framework for Fast Privacy-Preserving Computations
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
Technologies for the Pseudonymization of Medical Data: A Legal Evaluation
ICONS '09 Proceedings of the 2009 Fourth International Conference on Systems
Secure Multiparty Computation Goes Live
Financial Cryptography and Data Security
Hi-index | 0.00 |
Pseudonymization is sometimes used as a light-weight alternative to fully cryptographic solutions, when information from different data sources needs to be linked in a privacy-preserving manner. In this paper, we review several previously proposed pseudonymization techniques, point out their cryptographic and design flaws. As a solution, we have developed a simple pseudonymization framework based on X-Road, a unified database access layer serving as the basis for most eGovernment services developed in Estonia. Our solution has been fully implemented and benchmarking results together with the security analysis are presented to conclude the paper.