ENISA: Pseudonymisation Advanced Techniques and Use Cases

https://www.enisa.europa.eu/news/enisa-news/cybersecurity-to-the-rescue-pseudonymisation-for-personal-data-protection

Advanced encryption schemes
Ring signatures and group pseudonyms; chaining mode; pseudonyms based on multiple identifiers or attributes; pseudonyms with prooof of ownership; secure multiparty computation; secret sharing schemes

Pseudonymization use cases in healthcare
patient record comparison use case; medical research institution use-case; distributed storage use-case;

Advanced pseudonymisation scenario: the data custodianship
Notion of data custodianship; Personal Information Management System (PIMS) as data custodian; Data custodian as a part of the hospital; Data custodian as an independent organisation; Interconnected data custodian network

Pseudonymisation use cases in cybersecurity
Entities and roles; File Reputation; URL Reputation; Security Operations Centers; Consumer customer support; Protection gap and real-time protection

Report:
https://www.enisa.europa.eu/publications/data-pseudonymisation-advanced-techniques-and-use-cases/at_download/fullReport