DATA PSEUDONYMISATION: ADVANCED TECHNIQUES AND USE CASES
– An overview of the basic scenarios, pseudonymization techniques and policies.
– A presentation of a number of advanced pseudonymization techniques , including asymmetric encryption, ring signatures, chaining mode, Merkle trees, pseudonyms with proof of ownership, secure multiparty computation and secret sharing schemes.
– An analysis of the pseudonymization techniques and application scenarios in the area of healthcare and cybersecurity.
[ > European Union Agency for Cybersecurity — January 28, 2021 ]