{"id":"https://openalex.org/W7134903561","doi":"https://doi.org/10.3390/cryptography10020018","title":"Cryptographic Foundations of Pseudonymisation for Personal Data Protection","display_name":"Cryptographic Foundations of Pseudonymisation for Personal Data Protection","publication_year":2026,"publication_date":"2026-03-11","ids":{"openalex":"https://openalex.org/W7134903561","doi":"https://doi.org/10.3390/cryptography10020018"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography10020018","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020018","pdf_url":"https://www.mdpi.com/2410-387X/10/2/18/pdf?version=1773223189","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/10/2/18/pdf?version=1773223189","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055458960","display_name":"Konstantinos Limniotis","orcid":"https://orcid.org/0000-0002-7663-7169"},"institutions":[{"id":"https://openalex.org/I2799623607","display_name":"Hellenic Civil Aviation Authority","ror":"https://ror.org/00q3w5456","country_code":"GR","type":"government","lineage":["https://openalex.org/I2799623607","https://openalex.org/I4210132302"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Konstantinos Limniotis","raw_affiliation_strings":["Hellenic Data Protection Authority, Kifissias 1-3, 11523 Athens, Greece"],"raw_orcid":"https://orcid.org/0000-0002-7663-7169","affiliations":[{"raw_affiliation_string":"Hellenic Data Protection Authority, Kifissias 1-3, 11523 Athens, Greece","institution_ids":["https://openalex.org/I2799623607"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5055458960"],"corresponding_institution_ids":["https://openalex.org/I2799623607"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.44731681,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"2","first_page":"18","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.19910000264644623,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.19910000264644623,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.13379999995231628,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.13050000369548798,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6248000264167786},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.6060000061988831},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4715999960899353},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.38769999146461487},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.3756999969482422},{"id":"https://openalex.org/keywords/taxonomy","display_name":"Taxonomy (biology)","score":0.3547999858856201},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.3529999852180481},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3529999852180481}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6937999725341797},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6248000264167786},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.6060000061988831},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5889000296592712},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4715999960899353},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4293999969959259},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.38769999146461487},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3756999969482422},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.3547999858856201},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3529999852180481},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.3529999852180481},{"id":"https://openalex.org/C3090818","wikidata":"https://www.wikidata.org/wiki/Q1172506","display_name":"General Data Protection Regulation","level":3,"score":0.33410000801086426},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.3287999927997589},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.30799999833106995},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.30410000681877136},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.3037000000476837},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.3001999855041504},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.28760001063346863},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.28630000352859497},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.28519999980926514},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.275299996137619},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.2624000012874603},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.25589999556541443},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.25130000710487366}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography10020018","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020018","pdf_url":"https://www.mdpi.com/2410-387X/10/2/18/pdf?version=1773223189","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5df5a6057d2b4b76b8f37c66e2e89759","is_oa":true,"landing_page_url":"https://doaj.org/article/5df5a6057d2b4b76b8f37c66e2e89759","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 10, Iss 2, p 18 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography10020018","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020018","pdf_url":"https://www.mdpi.com/2410-387X/10/2/18/pdf?version=1773223189","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6395787000656128,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7134903561.pdf","grobid_xml":"https://content.openalex.org/works/W7134903561.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W163013775","https://openalex.org/W1497439563","https://openalex.org/W1542845548","https://openalex.org/W1554520266","https://openalex.org/W1601001795","https://openalex.org/W1964493386","https://openalex.org/W2003036326","https://openalex.org/W2019198738","https://openalex.org/W2086042811","https://openalex.org/W2141420453","https://openalex.org/W2159024459","https://openalex.org/W2165210192","https://openalex.org/W2314037005","https://openalex.org/W2535199873","https://openalex.org/W2584183247","https://openalex.org/W2620424523","https://openalex.org/W2753524298","https://openalex.org/W2800652629","https://openalex.org/W2914372901","https://openalex.org/W2962798563","https://openalex.org/W2963120176","https://openalex.org/W2988818867","https://openalex.org/W3026923845","https://openalex.org/W3086885601","https://openalex.org/W3160382601","https://openalex.org/W3183189956","https://openalex.org/W3216048534","https://openalex.org/W4283397891","https://openalex.org/W4317435009","https://openalex.org/W4362686174","https://openalex.org/W4377097576","https://openalex.org/W4399219416","https://openalex.org/W4406241543","https://openalex.org/W4408364850","https://openalex.org/W4414593359"],"related_works":[],"abstract_inverted_index":{"Pseudonymisation":[0],"constitutes":[1],"an":[2],"essential":[3],"technical":[4],"and":[5,26,40,44],"organisational":[6],"measure":[7],"for":[8],"implementing":[9],"personal":[10],"data-protection":[11,125,141],"safeguards.":[12],"Its":[13],"main":[14],"goal":[15],"is":[16,137],"to":[17,54,68,98,112,123],"hide":[18],"identities":[19],"of":[20,33,79,131,159],"individuals,":[21],"thus":[22],"reducing":[23],"data":[24,38,57],"protection":[25],"privacy":[27],"risks":[28],"through":[29],"facilitating":[30],"the":[31,55,77,129,151,157],"fulfilment":[32],"several":[34],"principles":[35],"such":[36],"as":[37],"minimisation":[39],"security.":[41],"However,":[42],"selecting":[43],"deploying":[45],"appropriate":[46],"pseudonymisation":[47,101,132],"mechanisms":[48],"in":[49,134,139,149],"a":[50,61,113],"risk-based":[51],"approach,":[52],"tailored":[53],"specific":[56,124],"processing":[58],"context,":[59],"remains":[60],"non-trivial":[62],"task.":[63],"This":[64],"survey":[65],"paper":[66],"aims":[67],"present":[69],"especially":[70],"how":[71],"cryptography":[72],"can":[73],"be":[74],"used":[75],"at":[76],"service":[78],"pseudonymisation,":[80],"putting":[81],"emphasis":[82],"not":[83],"only":[84],"on":[85,90],"traditional":[86],"approaches":[87,110],"but":[88],"also":[89,144],"advanced":[91],"cryptographic":[92],"techniques":[93],"that":[94,115,120],"have":[95],"been":[96],"proposed":[97],"address":[99],"special":[100],"challenges.":[102,126],"To":[103],"this":[104,135],"end,":[105],"we":[106,143],"systematically":[107],"classify":[108],"existing":[109],"according":[111],"taxonomy":[114],"captures":[116],"key":[117],"design":[118],"dimensions":[119],"are":[121],"relevant":[122],"Finally,":[127],"since":[128],"notion":[130],"adopted":[133],"work":[136],"grounded":[138],"European":[140],"law,":[142],"discuss":[145],"recent":[146],"legal":[147],"developments,":[148],"particular":[150],"CJEU\u2019s":[152],"latest":[153],"judgment,":[154],"which":[155],"refined":[156],"interpretation":[158],"pseudonymous":[160],"data.":[161]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-03-12T00:00:00"}
