{"id":"https://openalex.org/W2048325857","doi":"https://doi.org/10.1145/2810103.2813658","title":"(Un)linkable Pseudonyms for Governmental Databases","display_name":"(Un)linkable Pseudonyms for Governmental Databases","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W2048325857","doi":"https://doi.org/10.1145/2810103.2813658","mag":"2048325857"},"language":"en","primary_location":{"id":"doi:10.1145/2810103.2813658","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813658","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045989894","display_name":"Jan Camenisch","orcid":"https://orcid.org/0000-0001-6654-9459"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Jan Camenisch","raw_affiliation_strings":["IBM Research - Zurich, Rueschlikon, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Research - Zurich, Rueschlikon, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044041318","display_name":"Anja Lehmann","orcid":"https://orcid.org/0000-0002-2872-7899"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Anja Lehmann","raw_affiliation_strings":["IBM Research - Zurich, Rueschlikon, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Research - Zurich, Rueschlikon, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045989894"],"corresponding_institution_ids":["https://openalex.org/I4210126328"],"apc_list":null,"apc_paid":null,"fwci":3.0201,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.92504784,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1467","last_page":"1479"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8205569982528687},{"id":"https://openalex.org/keywords/pseudonym","display_name":"Pseudonym","score":0.6767995357513428},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.6600249409675598},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6217854022979736},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6165773868560791},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5625923871994019},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.49063387513160706},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4738476872444153},{"id":"https://openalex.org/keywords/data-exchange","display_name":"Data exchange","score":0.4245702028274536},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22357815504074097}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8205569982528687},{"id":"https://openalex.org/C2776021475","wikidata":"https://www.wikidata.org/wiki/Q61002","display_name":"Pseudonym","level":2,"score":0.6767995357513428},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.6600249409675598},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6217854022979736},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6165773868560791},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5625923871994019},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.49063387513160706},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4738476872444153},{"id":"https://openalex.org/C15845906","wikidata":"https://www.wikidata.org/wiki/Q1172338","display_name":"Data exchange","level":2,"score":0.4245702028274536},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22357815504074097},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2810103.2813658","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813658","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G513849608","display_name":null,"funder_award_id":"321310, 318424","funder_id":"https://openalex.org/F4320334960","funder_display_name":"Seventh Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320334960","display_name":"Seventh Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1499934958","https://openalex.org/W1574149717","https://openalex.org/W1589034595","https://openalex.org/W1606936281","https://openalex.org/W1773518014","https://openalex.org/W1964493386","https://openalex.org/W2017481266","https://openalex.org/W2019198738","https://openalex.org/W2030729543","https://openalex.org/W2108834246","https://openalex.org/W2117685508","https://openalex.org/W2131235219","https://openalex.org/W2135930857","https://openalex.org/W2165297797","https://openalex.org/W2166462813","https://openalex.org/W2224364690","https://openalex.org/W2246750538","https://openalex.org/W2282463261","https://openalex.org/W3030639938","https://openalex.org/W3032554290","https://openalex.org/W7014597539"],"related_works":["https://openalex.org/W4312703968","https://openalex.org/W2006481680","https://openalex.org/W4238485385","https://openalex.org/W3040655580","https://openalex.org/W4237288550","https://openalex.org/W2253886097","https://openalex.org/W17155033","https://openalex.org/W2467943370","https://openalex.org/W3194823921","https://openalex.org/W2044980128"],"abstract_inverted_index":{"When":[0],"data":[1,17,31,44,130],"maintained":[2],"in":[3,39,73,160],"a":[4,23,81,97,116],"decentralized":[5],"fashion":[6],"needs":[7],"to":[8,91,114],"be":[9,48,115],"synchronized":[10],"or":[11,55],"exchanged":[12],"between":[13,104],"different":[14],"databases,":[15],"related":[16,172],"sets":[18],"usually":[19],"get":[20],"associated":[21],"with":[22,36],"unique":[24],"identifier.":[25],"While":[26],"this":[27],"approach":[28,89],"facilitates":[29],"cross-domain":[30,102],"exchange,":[32],"it":[33,122,131],"also":[34],"comes":[35],"inherent":[37],"drawbacks":[38],"terms":[40],"of":[41,152],"controllability.":[42],"As":[43],"records":[45,62],"can":[46,53,123],"easily":[47],"linked,":[49],"no":[50],"central":[51,98,112],"authority":[52,99,113],"limit":[54],"control":[56],"the":[57,71,101,105,111,129,134,161],"information":[58],"flow.":[59],"Worse,":[60],"when":[61],"contain":[63],"sensitive":[64],"personal":[65],"data,":[66],"as":[67,120],"is":[68,90],"for":[69],"instance":[70],"case":[72],"national":[74],"social":[75],"security":[76,83],"systems,":[77],"such":[78],"linkability":[79],"poses":[80],"massive":[82],"and":[84,127,146,164],"privacy":[85],"threat.":[86],"An":[87],"alternative":[88],"use":[92],"domain-specific":[93],"pseudonyms,":[94],"where":[95],"only":[96],"knows":[100],"relation":[103],"pseudonyms.":[106],"However,":[107],"current":[108],"solutions":[109],"require":[110],"fully":[117],"trusted":[118],"party,":[119],"otherwise":[121],"provide":[124,165],"false":[125],"conversions":[126],"exploit":[128],"learns":[132],"from":[133],"requests.":[135],"We":[136,155],"propose":[137],"an":[138,166],"(un)linkable":[139],"pseudonym":[140],"system":[141],"that":[142],"overcomes":[143],"those":[144],"limitations,":[145],"enables":[147],"controlled":[148],"yet":[149],"privacy-friendly":[150],"exchange":[151],"distributed":[153],"data.":[154],"prove":[156],"our":[157],"protocol":[158],"secure":[159],"UC":[162],"framework":[163],"efficient":[167],"instantiation":[168],"based":[169],"on":[170],"discrete-logarithm":[171],"assumptions.":[173]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
