[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Verheul, 2015 - Google Patents

Privacy protection in electronic education based on polymorphic pseudonymization

Verheul, 2015

View PDF
Document ID
933364950614105761
Author
Verheul E
Publication year
Publication venue
Cryptology ePrint Archive

External Links

Snippet

Abstract In [13.] Dutch government proposes an identity scheme supporting personal data exchange of pupils with private e-textbook publishers. This design propagates sharing personal numbers of pupils among private parties violating the data minimisation principle in …
Continue reading at eprint.iacr.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
CN106961336B (en) A kind of key components trustship method and system based on SM2 algorithm
US8683209B2 (en) Method and apparatus for pseudonym generation and authentication
CN107733648A (en) The RSA digital signature generation method and system of a kind of identity-based
EP2792098B1 (en) Group encryption methods and devices
CN107707358A (en) A kind of EC KCDSA digital signature generation method and system
CN110138567A (en) A kind of collaboration endorsement method based on ECDSA
CN109981292B (en) SM9 algorithm-based authentication method, device and system
Anand et al. EECDH to prevent MITM attack in cloud computing
Yin et al. An efficient and secured data storage scheme in cloud computing using ECC-based PKI
KR20230141845A (en) Threshold key exchange
JP2014515125A (en) Method, computer program, and apparatus for data encryption
CN106453253B (en) A kind of hideing for efficient identity-based signs decryption method
Chow New privacy-preserving architectures for identity-/attribute-based encryption
Abusukhon et al. An authenticated, secure, and mutable multiple‐session‐keys protocol based on elliptic curve cryptography and text‐to‐image encryption algorithm
Verheul Privacy protection in electronic education based on polymorphic pseudonymization
CN116318696B (en) Proxy re-encryption digital asset authorization method under condition of no initial trust of two parties
CN110798313A (en) Secret dynamic sharing-based collaborative generation method and system for number containing secret
Chen et al. Blockchain as a CA: A provably secure signcryption scheme leveraging blockchains
Yin et al. PKI-based cryptography for secure cloud data storage using ECC
Barker et al. SP 800-56A. recommendation for pair-wise key establishment schemes using discrete logarithm cryptography (revised)
Xu et al. New construction of affiliation‐hiding authenticated group key agreement
Li et al. Certificateless identity-concealed authenticated encryption under multi-KGC
Wang Signer‐admissible strong designated verifier signature from bilinear pairings
Abdalla et al. Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System.
CN113556236B (en) Energy data middlebox sensitive content entrusting and authorizing method based on proxy signature