0000000000391816

AUTHOR

Gilles Trouessin

showing 2 related works from this author

Combining hashing and enciphering algorithms for epidemiological analysis of gathered data.

2008

Summary Objectives: Compiling individual records coming from different sources is necessary for multi-center studies. Legal aspects can be satisfied by implementing anonymization procedures. When using these procedures with a different key for each study it becomes almost impossible to link records from separate data collections. Methods: The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient’s identity. Results: The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme…

Scheme (programming language)Computer sciencemedia_common.quotation_subjectHash functionHealth Informaticscomputer.software_genreEncryption01 natural sciencesField (computer science)Patient identificationPublic-key cryptography010104 statistics & probability03 medical and health sciences0302 clinical medicineHealth Information ManagementOriginality030212 general & internal medicine0101 mathematicscomputer.programming_languagemedia_commonAdvanced and Specialized Nursingbusiness.industryData CollectionEpidemiologic StudiesIdentity (object-oriented programming)Data miningbusinesscomputerAlgorithmsConfidentialityMethods of information in medicine
researchProduct

Chaînage de bases de données anonymisées pour les études épidémiologiques multicentriques nationales et internationales : proposition d'un algorithme…

2009

Background: Compiling individual records coming from different sources is very important for multicenter epidemiological studies; however, European directives and other national legislation concerning nominal data processing must be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, this type of anonymization procedure is in contradiction with common requirements in public health and biomedical research because it becom…

Identité du patient020205 medical informaticsEpidemiologyComputer scienceHash functionEncryptionCryptographyPatient identificationSécuritéDossier médical du patient02 engineering and technologyComputer securitycomputer.software_genreEncryptionPublic-key cryptography03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0302 clinical medicineAnonymized dataHashingChainage de données0202 electrical engineering electronic engineering information engineeringCryptographic hash functionDonnées anonymisées[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]030212 general & internal medicineChiffrementMulticenter studies[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]Secure Hash Algorithm[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]business.industryUniversal hashingLinkageHachagePublic Health Environmental and Occupational Health16. Peace & justice3. Good health[SDV.SPEE] Life Sciences [q-bio]/Santé publique et épidémiologieEtudes multicentriquesSecurity[SDV.SPEE]Life Sciences [q-bio]/Santé publique et épidémiologiebusinesscomputerPersonally identifiable information
researchProduct