Private anonymous data access

A Hamlin, R Ostrovsky, M Weiss, D Wichs�- Advances in Cryptology�…, 2019 - Springer
private database which only she can access. In this case we want to maintain privacy and
anonymity … the content of the data, which clients are accessing their data, or what parts of their …

Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption

T Jung, XY Li, Z Wan, M Wan�- IEEE transactions on�…, 2014 - ieeexplore.ieee.org
… created with an access structure, which specifies the encryption policy, and private keys are
… if and only if his attributes in the private key satisfy the access tree specified in the ciphertext. …

Private updates to anonymous databases

A Trombetta, E Bertino�- …�International Conference on Data�…, 2006 - ieeexplore.ieee.org
… with a tuple owned by Bob, is still k-anonymous. Suppose moreover that access to the
database is strictly controlled, because for example data are used for experiments that need to be …

Privacy preserving data sharing with anonymous ID assignment

LA Dunning, R Kresman�- IEEE transactions on information�…, 2012 - ieeexplore.ieee.org
… mining, collision avoidance in communications and distributed database access. The … The
problem of sharing privately held data so that the individuals who are the subjects of the data

Anonymous data v. personal data-false debate: an EU perspective on anonymization, pseudonymization and personal data

S Stalla-Bourdillon, A Knight�- Wis. Int'l LJ, 2016 - HeinOnline
… anonymization in big data, together with other techniques and data access controls, which
it … easily understandable by private actors and especially data analysists and data scientists …

Private and anonymous data storage and distribution in cloud

Q Duan, Y Wang, F Mohsen…�- 2013 IEEE International�…, 2013 - ieeexplore.ieee.org
… The scheme achieves the data storage correctness, allows the authenticated customer to
access the data and data error localization, ie, the identification of misbehaving servers. In [2], …

Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data

J Camenisch, M Kohlweiss, A Rial…�- Public Key Cryptography�…, 2009 - Springer
data is a desirable counter measure against data theft. But how, then, can the investigator,
such as the police or a secret service, search the data … only be given access to data that fulfills …

An anonymous data access scheme for VANET using pseudonym-based cryptography

C Wang, D Shi, X Xu, J Fang�- Journal of Ambient Intelligence and�…, 2016 - Springer
… \(\text {Extract}(mpk, \mathsf {PN}_{\it X})\): to generate a pseudonym and the corresponding
private key, an anonymous entity X chooses \(k_X \overset{\$}{\leftarrow } {\mathbf {{Z}}}_{q}^{…

[HTML][HTML] A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and�…

KH Jones, DV Ford, C Jones, R Dsilva…�- Journal of biomedical�…, 2014 - Elsevier
data access agreement for responsible data utilisation and understanding that misconduct
will be subject to disciplinary action. Data access … Gateway via a Virtual Private Network (VPN) …

Anonymous tokens with public metadata and applications to private contact tracing

T Silde, M Strand�- …�Conference on Financial Cryptography and Data�…, 2022 - Springer
… We give the adversary access to two signing oracles: One uses the adversary’s chosen … ,
we present anonymous tokens with public and private metadata and anonymous tokens with …