ABSTRACT
Due to the COVID-19 pandemic, many researchers have proposed privacy-preserving smartphone proximity tracing. Current projects, based on ephemeral IDs, are vulnerable to DoS attacks. In this paper, we present BlindSignedIDs that can be verified in-place through a TESLA server. We will demonstrate our BlindSignedIDs can effectively mitigate such DoS attacks.
- David Chaum. 1981. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Commun. ACM 24, 2 (1981), 84--90.Google Scholar
Digital Library
- David Chaum. 1983. Blind signatures for untraceable payments. In Advances in cryptology. Springer, 199--203.Google Scholar
- Adrian Perrig et al. 2002. The TESLA broadcast authentication protocol. Rsa Cryptobytes 5, 2 (2002), 2--13.Google Scholar
- Carmela Troncoso et al. 2020. Decentralized Privacy-Preserving Proximity Tracing. arXiv:2005.12273 [cs.CR]Google Scholar
- Justin Chan et al. 2020. PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing. IEEE Data Engineering Bulletin 43, 2 (July 2020), 15--35.Google Scholar
- Ronald L Rivest et al. 2020. Pact: Private automated contact tracing.Google Scholar
- Google/Apple. 2020. Privacy-Preserving Contact Tracing. Retrieved May 28, 2020 from https://www.apple.com/covid19/contacttracingGoogle Scholar
Index Terms
Mitigating denial-of-service attacks on digital contact tracing: poster abstract
Recommendations
Mitigating denial of service attacks: a tutorial
This tutorial describes what Denial of Service (DOS) attacks are. how they can be carried out in IP networks, and how one can defend against them. Distributed DoS (DDoS) attacks are included here as a subset of DoS attacks. A DoS attack has two phases: ...
Surviving Distributed Denial-of-Service Attacks
A series of distributed denial-of-service (DDoS) attacks were launched against computer systems and services in the US and South Korea beginning July 4th. A DDoS attack is an attempt to make a computer service unavailable to its intended users. The ...
Mitigating Distributed Denial-of-Service Attacks: Application-Defense and Network-Defense Methods
EC2ND '11: Proceedings of the 2011 Seventh European Conference on Computer Network DefenseDistributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the computing resources or bandwidth of the potential targets. Based on the types of the targets, DDoS attacks can be addressed in two levels: application-level ...





Comments