ABSTRACT
Digital contact tracing is an essential countermeasure for an epidemic as a society, and balancing the surveillance resolution and user privacy for contact tracing remains an open challenge. Existing contact tracing schemes are primarily based on proximity tracing, which uses Bluetooth to detect coexistence. Proximity tracing has a strong advantage in anonymizing the users, but shows low epidemiological resolution and lacks the flexibility to be integrated with other data sources. To address this problem, we propose an alternative scheme we phrase as context tracing. Our scheme achieves strong performance in both surveillance resolution and user privacy protection by integrating multi-modal sensor fusion and homomorphic encryption. While this advantage comes at the cost of high computational overhead, we discuss possible optimization strategies for reducing energy consumption on mobile devices.
- N. Ahmed, R. A. Michelin, W. Xue, S. Ruj, R. Malaney, S. S. Kanhere, A. Seneviratne, W. Hu, H. Janicke, and S. K. Jha. 2020. A Survey of COVID-19 Contact Tracing Apps. IEEE Access 8 (2020), 134577--134601.Google Scholar
Cross Ref
- Luca Ferretti, Chris Wymant, Michelle Kendall, Lele Zhao, Anel Nurtay, Lucie Abeler-Dörner, Michael Parker, David Bonsall, and Christophe Fraser. 2020. Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing. Science 368, 6491 (2020).Google Scholar
- M. Nassar, A. Erradi, and Q. M. Malluhi. 2015. Paillier's encryption: Implementation and cloud applications. In 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR). 1--5.Google Scholar
- World Health Organization. 2020. Contact tracing in the context of COVID-19: interim guidance, 10 May 2020. Technical documents. 7 p. pages.Google Scholar
- Michael J Parker, Christophe Fraser, Lucie Abeler-Dörner, and David Bonsall. 2020. Ethics of instantaneous contact tracing using mobile phone apps in the control of the COVID-19 pandemic. Journal of Medical Ethics 46, 7 (2020), 427--431.Google Scholar
Index Terms
Privacy-preserving contact tracing using homomorphic encryption: poster abstract
Recommendations
A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings
A new method is presented to privately outsource computation of different users. As a significant cryptographic primitive in cloud computing, homomorphic encryption HE can evaluate on ciphertext directly without decryption, thus avoid information ...
Shift-type homomorphic encryption and its application to fully homomorphic encryption
AFRICACRYPT'12: Proceedings of the 5th international conference on Cryptology in AfricaThis work addresses the characterization of homomorphic encryption schemes both in terms of security and design. In particular, we are interested in currently existing fully homomorphic encryption (FHE) schemes and their common structures and security. ...
Cryptanalysis of a homomorphic encryption scheme
Homomorphic encryption allows to make specific operations on private data which stays encrypted. While applications such as cloud computing require to have a practical solution, the encryption scheme must be secure. In this article, we detail and ...





Comments