fulfill the requirements uniqueness of the generated
pseudonyms, privacy in terms of hiding the origina-
tors identifier and unlinkability of individualdata sets.
Since the second variant is more efficient in terms of
computational costs and space it has been suggested
for the use within smartcards.
Beside proposing two practical generators, a proto-
col has been proposed through which a smartcard
can efficiently authenticate anonymously to a medi-
cal database (with respect to a pseudonym). Based
on this protocol medical registers can be extended
and updated anonymously by the patient. Further-
more such an authentication protocol can be used to
make entries in several databases. For each database,
a fresh pseudonym is used so that entries of different
databases are mutually computationally unlinkable.
Concerning collision-free number generation further
information on implementation issues and extended
constructionscan be found in (Schaffer and Schartner,
2007) and (Schaffer, 2007) respectively.
REFERENCES
CNN (2000). National Health Identifier: Big Help or Big
Brother? http://www.cnn.com/HEALTH/bioethics/
9807/natl.medical.id.
D. Hankerson, A. Menezes, S. V. (2004). Guide to Elliptic
Curve Cryptography. Springer.
ElGamal, T. (1985). A Public Key Cryptosystem and a
Signature Scheme Based on Discrete Logarithms. In
Blakley, G. R. and Chaum, D., editors, Advances in
Cryptology – CRYPTO’84, volume 196 of Lecture
Notes in Computer Science, pages 10–18. Springer.
IEEE (2000). IEEE 1363-2000: IEEE Standard Specifica-
tions for Public-Key Cryptography. IEEE.
Institute for Health Freedom (2000). What’s Hap-
pening with the “Unique Health Identifier” Plan?
http://www.forhealthfreedom.org/Publications/
privacy/UniqueId.html.
Jonsson, J. and Kaliski, B. (2002). Public-
Key Cryptography Standards (PKCS)
#1: RSA Cryptography Specification.
http://www.rsa.com/rsalabs/node.asp?id=2125.
Medical Privacy Coalition (2007). Elim-
inate Unique Health Identifier.
http://www.medicalprivacycoalition.org/unique-
health-identifier.
NIST (2001). FIPS PUB 197: Specification
of the Advanced Encryption Standard (Na-
tional Institute of Standards and Technology).
http://csrc.nist.gov/publications/fips/fips197/fips-
197.pdf.
Pfitzmann, A. and K¨ohntopp, M. (2001). Anonymity, Un-
observability, and Pseudonymity – A Proposal for Ter-
minology. In Federrath, H., editor, Proceedings of
Workshop on Design Issues in Anonymity and Unob-
servability, volume 2009 of Lecture Notes in Com-
puter Science, pages 1–9. Springer.
Rivest, R. L., Shamir, A., and Adleman, L. M. (1978). A
Method for Obtaining Digital Signatures and Public-
Key Cryptosystems. Commun. ACM, 21(2):120–126.
Schaffer, M. (2007). Collision-Free Number Generation:
Efficienty Constructions, Privacy Issues, and Crypto-
graphic Aspects. PhD-Thesis, Klagenfurt University.
Schaffer, M. and Schartner, P. (2007). Implement-
ing Collision-Free Number Generators on JavaCards.
Technical Report TR-syssec-07-03, University of Kla-
genfurt.
Schaffer, M., Schartner, P., and Rass, S. (2007). Univer-
sally Unique Identifiers: How to ensure Uniqueness
while Preserving the Issuer’s Privacy. In Alissi, S. and
Arabnia, H. R., editors, Proceedings of the 2007 In-
ternational Conference on Security & Management –
SAM’07, pages 198–204. CSREA Press.
Schartner, P. and Schaffer, M. (2005). Unique User-
Generated Digital Pseudonyms. In Gorodetsky, V.,
Kotenko, I. V., and Skormin, V. A., editors, Proceed-
ings of Mathematical Methods, Models, and Architec-
tures for Computer Network Security – MMM-ACNS
2005, volume 3685 of Lecture Notes in Computer Sci-
ence, pages 194–205. Springer.