{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T00:40:20Z","timestamp":1771720820866,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,4,21]],"date-time":"2022-04-21T00:00:00Z","timestamp":1650499200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,21]],"date-time":"2022-04-21T00:00:00Z","timestamp":1650499200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001711","name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung","doi-asserted-by":"publisher","award":["200021-188824"],"award-info":[{"award-number":["200021-188824"]}],"id":[{"id":"10.13039\/501100001711","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Nat Comput Sci"],"DOI":"10.1038\/s43588-022-00236-x","type":"journal-article","created":{"date-parts":[[2022,4,21]],"date-time":"2022-04-21T16:06:16Z","timestamp":1650557176000},"page":"208-210","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Why the search for a privacy-preserving data sharing mechanism is failing"],"prefix":"10.1038","volume":"2","author":[{"given":"Theresa","family":"Stadler","sequence":"first","affiliation":[]},{"given":"Carmela","family":"Troncoso","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,21]]},"reference":[{"key":"236_CR1","unstructured":"European Data Strategy (European Commission, 2020); https:\/\/ec.europa.eu\/info\/strategy\/priorities-2019-2024\/europe-fit-digital-age\/european-data-strategy"},{"key":"236_CR2","unstructured":"Federal Data Strategy (US Federal Department of Commerce US Federal Office of Management & Budget and Science & Technology, 2020); https:\/\/strategy.data.gov\/"},{"key":"236_CR3","unstructured":"Article 29 Data Protection Working Party. Opinion 05\/2014 on Anonymisation Techniques (European Parliament; 2014); https:\/\/ec.europa.eu\/justice\/article-29\/documentation\/opinion-recommendation\/files\/2014\/wp216_en.pdf"},{"key":"236_CR4","unstructured":"Troncoso, C. In The Cyber Security Body of Knowledge Ch. 5 (Univ. Bristol, 2019)."},{"key":"236_CR5","unstructured":"Smart, N. In The Cyber Security Body of Knowledge Ch. 10 (Univ. Bristol, 2019)."},{"key":"236_CR6","doi-asserted-by":"crossref","unstructured":"Archer, D. W. et al. From Keys to Databases \u2014 Real-World Applications of Secure Multi-Party Computation (The Computer Journal, 2018).","DOI":"10.1093\/comjnl\/bxy090"},{"key":"236_CR7","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1561\/0400000042","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C. & Roth, A. Found. Trends Theor. Comput. Sci. 9, 211\u2013407 (2014).","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"236_CR8","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L. Int. J. Uncertain Fuzz. 10, 557\u2013570 (2002).","journal-title":"Int. J. Uncertain Fuzz."},{"key":"236_CR9","doi-asserted-by":"crossref","unstructured":"Narayanan, A. & Shmatikov, V. Myths and Fallacies of \u201cPersonally Identifiable Information\u201d (Communications of the ACM, 2010).","DOI":"10.1145\/1743546.1743558"},{"key":"236_CR10","unstructured":"Culnane, C., Rubinstein, B. I. P. & Teague, V. Preprint at https:\/\/arxiv.org\/abs\/1712.05627 (2017)."},{"key":"236_CR11","first-page":"1","volume":"22","author":"SM Bellovin","year":"2019","unstructured":"Bellovin, S. M., Dutta, P. K. & Reitinger, N. Stan. Tech. L. Rev. 22, 1 (2019).","journal-title":"Stan. Tech. L. Rev."},{"key":"236_CR12","doi-asserted-by":"crossref","unstructured":"Augusto, C., Mor\u00e1n, J., De La Riva, C. & Tuya, J. Test-driven anonymization for artificial intelligence. In 2019 IEEE Int. Conf. Artificial Intelligence Testing (AITest) (IEEE, 2019).","DOI":"10.1109\/AITest.2019.00011"},{"key":"236_CR13","unstructured":"https:\/\/mostly.ai\/"},{"key":"236_CR14","unstructured":"https:\/\/statice.ai\/"},{"key":"236_CR15","unstructured":"https:\/\/hazy.com\/"},{"key":"236_CR16","unstructured":"Bernardo, V. Tech Sonar 2021\u20132022 Report \u2014 Synthetic Data (European Data Protection Supervisor, 2021)."},{"key":"236_CR17","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-27566-0","volume":"13","author":"F Houssiau","year":"2022","unstructured":"Houssiau, F., Rocher, L. & de Montjoye, Y. A. Nat. Commun. 13, 29 (2022).","journal-title":"Nat. Commun."},{"key":"236_CR18","unstructured":"Stadler, T., Oprisanu, B. & Troncoso, C. Synthetic Data\u2013Anonymisation Groundhog Day (USENIX, 2022)."},{"key":"236_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1093\/jamia\/ocaa249","volume":"28","author":"K El Emam","year":"2021","unstructured":"El Emam, K., Mosquera, L. & Zheng, C. J. Am. Med. Inform. Assoc. 28, 3\u201313 (2021).","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"236_CR20","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-25972-y","volume":"12","author":"D Froelicher","year":"2021","unstructured":"Froelicher, D. et al. Nat. Commun. 12, 5910 (2021).","journal-title":"Nat. Commun."},{"key":"236_CR21","unstructured":"Bagdasaryan, E., Poursaeed, O. & Shmatikov, V. Differential privacy has disparate impact on model accuracy. In Proc. 33rd Int. Conf. Neural Information Processing Systems 1387 (Neural Information Processing Systems, 2019)."}],"container-title":["Nature Computational Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.nature.com\/articles\/s43588-022-00236-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s43588-022-00236-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s43588-022-00236-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,25]],"date-time":"2022-11-25T10:29:13Z","timestamp":1669372153000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.nature.com\/articles\/s43588-022-00236-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,21]]},"references-count":21,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,4]]}},"alternative-id":["236"],"URL":"https:\/\/doi.org\/10.1038\/s43588-022-00236-x","relation":{},"ISSN":["2662-8457"],"issn-type":[{"value":"2662-8457","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,21]]},"assertion":[{"value":"21 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}