Verheul, 2015 - Google Patents
Privacy protection in electronic education based on polymorphic pseudonymizationVerheul, 2015
View PDF- Document ID
- 933364950614105761
- Author
- Verheul E
- Publication year
- Publication venue
- Cryptology ePrint Archive
External Links
Snippet
Abstract In [13.] Dutch government proposes an identity scheme supporting personal data exchange of pupils with private e-textbook publishers. This design propagates sharing personal numbers of pupils among private parties violating the data minimisation principle in …
- 210000001747 Pupil 0 abstract description 100
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106961336B (en) | A kind of key components trustship method and system based on SM2 algorithm | |
US8683209B2 (en) | Method and apparatus for pseudonym generation and authentication | |
CN107733648A (en) | The RSA digital signature generation method and system of a kind of identity-based | |
EP2792098B1 (en) | Group encryption methods and devices | |
CN107707358A (en) | A kind of EC KCDSA digital signature generation method and system | |
CN110138567A (en) | A kind of collaboration endorsement method based on ECDSA | |
CN109981292B (en) | SM9 algorithm-based authentication method, device and system | |
Anand et al. | EECDH to prevent MITM attack in cloud computing | |
Yin et al. | An efficient and secured data storage scheme in cloud computing using ECC-based PKI | |
KR20230141845A (en) | Threshold key exchange | |
JP2014515125A (en) | Method, computer program, and apparatus for data encryption | |
CN106453253B (en) | A kind of hideing for efficient identity-based signs decryption method | |
Chow | New privacy-preserving architectures for identity-/attribute-based encryption | |
Abusukhon et al. | An authenticated, secure, and mutable multiple‐session‐keys protocol based on elliptic curve cryptography and text‐to‐image encryption algorithm | |
Verheul | Privacy protection in electronic education based on polymorphic pseudonymization | |
CN116318696B (en) | Proxy re-encryption digital asset authorization method under condition of no initial trust of two parties | |
CN110798313A (en) | Secret dynamic sharing-based collaborative generation method and system for number containing secret | |
Chen et al. | Blockchain as a CA: A provably secure signcryption scheme leveraging blockchains | |
Yin et al. | PKI-based cryptography for secure cloud data storage using ECC | |
Barker et al. | SP 800-56A. recommendation for pair-wise key establishment schemes using discrete logarithm cryptography (revised) | |
Xu et al. | New construction of affiliation‐hiding authenticated group key agreement | |
Li et al. | Certificateless identity-concealed authenticated encryption under multi-KGC | |
Wang | Signer‐admissible strong designated verifier signature from bilinear pairings | |
Abdalla et al. | Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System. | |
CN113556236B (en) | Energy data middlebox sensitive content entrusting and authorizing method based on proxy signature |