Skip to main content

Privacy-Aware Identity Management

  • Reference work entry
  • First Online:
Encyclopedia of Big Data Technologies

Synonyms

Authenticating anonymized data with domain signatures; Privacy protection via replacing identifiers with domain pseudonyms

Definitions

Definition 1

Personal data protection means measures aiming to guarantee that processing of data concerning identified or identifiable persons (data subjects):

  • takes place based on a consent of the data subject or is otherwise explicitly permitted by law,

  • is confined solely to the purpose of processing,

  • is secure by design and by default:

whereas processing is any operation on personal data, including in particular storing, removing, and giving access to it.

Definition 2

Pseudonimization is a process of translating identifiers into pseudonyms and replacing the identifiers in a data set with the corresponding pseudonyms. A pseudonymization process should be irreversible, except for a deanonymization procedure (if defined).

Deanonymizationis a process which links back the pseudonyms with the identifiers. It should require the use of appropriate...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 849.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 999.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Baldimtsi F, Camenisch J, Hanzlik L, Krenn S, Lehmann A, Neven G (2015) Recovering lost device-bound credentials. In: Malkin T, Kolesnikov V, Lewko AB, Polychronakis M (eds) Applied cryptography and network security – 13th international conference, ACNS 2015, 2–5 June 2015, Revised selected papers. Lecture notes in computer science, vol 9092. Springer, New York, pp 307–327. https://doi.org/10.1007/978-3-319-28166-7_15

    Google Scholar 

  • Bender J, Dagdelen Ö, Fischlin M, Kügler D (2012) Domain-specific pseudonymous signatures for the german identity card. In: Gollmann D, Freiling FC (eds) Proceedings of the 15th international conference on information security, ISC, 19–21 Sept 2012. Lecture notes in computer science, vol 7483. Springer, Passau, pp 104–119. https://doi.org/10.1007/978-3-642-33383-5_7

    Google Scholar 

  • Bringer J, Chabanne H, Lescuyer R, Patey A (2014) Efficient and strongly secure dynamic domain-specific pseudonymous signatures for ID documents. In: Christin N, Safavi-Naini R (eds) 18th international conference on financial cryptography and data security, FC 3–7 Mar 2014, Revised selected papers. Lecture notes in computer science, vol 8437. Springer, Christ Church, Barbados, pp 255–272. https://doi.org/10.1007/978-3-662-45472-5_16

    Google Scholar 

  • BSI (2016) Technical guideline tr-03110 v2.21 – advanced security mechanisms for machine readable travel documents and eIDAS token. Available at: https://www.bsi.bund.de/EN/Publications/Technical Guidelines/TR03110/BSITR03110.html

  • Fuchsbauer G (2011) Commuting signatures and verifiable encryption. In: Paterson KG (ed) Advances in cryptology – EUROCRYPT 2011–30th annual international conference on the theory and applications of cryptographic techniques, 15–19 May 2011. Proceedings. Lecture notes in computer science, vol 6632. Springer, Tallinn, pp 224–245. https://doi.org/10.1007/978-3-642-20465-4_14

    Google Scholar 

  • Hanzlik L, Kluczniak K, Kutyłowski M, Dolev S (2016) Local self-organization with strong privacy protection. In: 2016 IEEE Trustcom/BigDataSE/ISPA, 23–26 Aug 2016. IEEE, Tianjin, pp 775–782. https://doi.org/10.1109/TrustCom.2016.0138

  • Klonowski M, Kutylowski M, Lauks A, Zagórski F (2005) Conditional digital signatures. In: Katsikas SK, Lopez J, Pernul G (eds) Trust, privacy and security in digital business: second international conference, TrustBus 2005, 22–26 Aug 2005. Proceedings. Lecture notes in computer science, vol 3592. Springer, Copenhagen, pp 206–215. https://doi.org/10.1007/11537878_21

    Chapter  Google Scholar 

  • Kutyłowski M, Krzywiecki Ł, Kubiak P, Koza M (2011) Restricted identification scheme and Diffie-Hellman linking problem. In: Chen L, Yung M, Zhu L (eds) Trusted systems – third international conference, INTRUST, 27–29 Nov 2011, Revised selected papers. Lecture notes in computer science, vol 7222. Springer, Beijing, pp 221–238. https://doi.org/10.1007/978-3-642-32298-3_15

    Google Scholar 

  • Kutyłowski M, Hanzlik L, Kluczniak K (2016) Pseudonymous signature on eIDAS token – implementation based privacy threats. In: Liu JK, Steinfeld R (eds) Information security and privacy – 21st Australasian conference, ACISP, 4–6 July 2016. Proceedings, Part II. Lecture notes in computer science, vol 9723. Springer, Melbourne, pp 467–477. https://doi.org/10.1007/978-3-319-40367-0_31

    MATH  Google Scholar 

  • Pedersen TP (1991) Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum J (ed) Advances in cryptology – CRYPTO ’91, 11th annual international cryptology conference, 11–15 Aug 1991. Proceedings. Lecture notes in computer science, vol 576. Springer, Santa Barbara, pp 129–140. https://doi.org/10.1007/3-540-46766-1_9

    Google Scholar 

  • The European Parliament and the Council of the European Union (2016) Regulation (EU) 2016/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/ec (General Data Protection Regulation). Official Journal of the European Union 119(1)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mirosław Kutyłowski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Kutyłowski, M., Błaśkiewicz, P. (2019). Privacy-Aware Identity Management. In: Sakr, S., Zomaya, A.Y. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-77525-8_241

Download citation

Publish with us

Policies and ethics