the Eighth Annual ACM Symposium on Principles of
Distributed Computing, Edmonton, Alberta, Canada,
August 14-16, 1989, pages 201–209. ACM.
Beaver, D. (2000). Minimal-latency secure function evalu-
ation. In (Preneel, 2000), pages 335–350.
Ben-Or, M., Goldwasser, S., and Wigderson, A. (1988).
Completeness theorems for non-cryptographic fault-
tolerant distributed computation (extended abstract).
In Simon, J., editor, Proceedings of the 20th Annual
ACM Symposium on Theory of Computing, May 2-4,
1988, Chicago, Illinois, USA, pages 1–10. ACM.
Camenisch, J. and Lehmann, A. (2017). Privacy-preserving
user-auditable pseudonym systems. In 2017 IEEE Eu-
ropean Symposium on Security and Privacy, EuroS&P
2017, Paris, France, April 26-28, 2017, pages 269–
284. IEEE.
Canetti, R. (2001). Universally composable security: A
new paradigm for cryptographic protocols. In 42nd
Annual Symposium on Foundations of Computer Sci-
ence, FOCS 2001, 14-17 October 2001, Las Vegas,
Nevada, USA, pages 136–145. IEEE Computer Soci-
ety.
Cramer, R., Damg
˚
ard, I., and Maurer, U. M. (2000). Gen-
eral secure multi-party computation from any linear
secret-sharing scheme. In (Preneel, 2000), pages 316–
334.
Damg
˚
ard, I., Fitzi, M., Kiltz, E., Nielsen, J. B., and Toft,
T. (2006). Unconditionally secure constant-rounds
multi-party computation for equality, comparison, bits
and exponentiation. In Halevi, S. and Rabin, T.,
editors, Theory of Cryptography, Third Theory of
Cryptography Conference, TCC 2006, New York, NY,
USA, March 4-7, 2006, Proceedings, volume 3876 of
Lecture Notes in Computer Science, pages 285–304.
Springer.
Desmedt, Y. and Frankel, Y. (1989). Threshold cryptosys-
tems. In Brassard, G., editor, Advances in Cryptol-
ogy - CRYPTO ’89, 9th Annual International Cryptol-
ogy Conference, Santa Barbara, California, USA, Au-
gust 20-24, 1989, Proceedings, volume 435 of Lecture
Notes in Computer Science, pages 307–315. Springer.
El Gamal, T. (1984). A public key cryptosystem and a sig-
nature scheme based on discrete logarithms. In Blak-
ley, G. R. and Chaum, D., editors, Advances in Cryp-
tology, Proceedings of CRYPTO ’84, Santa Barbara,
California, USA, August 19-22, 1984, Proceedings,
volume 196 of Lecture Notes in Computer Science,
pages 10–18. Springer.
Jakobsson, M. (1999). On quorum controlled asymmetric
proxy re-encryption. In Imai, H. and Zheng, Y., ed-
itors, Public Key Cryptography, Second International
Workshop on Practice and Theory in Public Key Cryp-
tography, PKC ’99, Kamakura, Japan, March 1-3,
1999, Proceedings, volume 1560 of Lecture Notes in
Computer Science, pages 112–121. Springer.
Lindell, Y. (2017). How to simulate it - A tutorial on the
simulation proof technique. In Tutorials on the Foun-
dations of Cryptography., pages 277–346.
Page, T. (2015). A forecast of the adoption of wearable
technology. IJTD, 6(2):12–29.
PEP (2017). Polymorphic encryption and pseudonymisa-
tion for personalised healthcare. https://pep.cs.ru.nl.
Preneel, B., editor (2000). Advances in Cryptology - EURO-
CRYPT 2000, International Conference on the The-
ory and Application of Cryptographic Techniques,
Bruges, Belgium, May 14-18, 2000, Proceeding, vol-
ume 1807 of Lecture Notes in Computer Science.
Springer.
Shamir, A. (1979). How to share a secret. Commun. ACM,
22(11):612–613.
Toft, T. (2007). Primitives and Applications for Multi-
party Computation. PhD thesis, University of Aarhus,
Aarhus.
Toft, T. (2009). Constant-rounds, almost-linear bit-
decomposition of secret shared values. In Fischlin,
M., editor, Topics in Cryptology - CT-RSA 2009, The
Cryptographers’ Track at the RSA Conference 2009,
San Francisco, CA, USA, April 20-24, 2009. Proceed-
ings, volume 5473 of Lecture Notes in Computer Sci-
ence, pages 357–371. Springer.
Verheul, E., Jacobs, B., Meijer, C., Hildebrandt, M., and
de Ruiter, J. (2016). Polymorphic encryption and
pseudonymisation for personalised healthcare. Cryp-
tology ePrint Archive, Report 2016/411.
Wearables (2017). Wearables market to be worth $25 billion
by 2019. http://www.ccsinsight.com/press.
Privacy-preserving Distributed Access Control for Medical Data
331