2020
DOI: 10.1007/978-3-030-64840-4_29
|View full text |Cite
|
Sign up to set email alerts
|

Catalic: Delegated PSI Cardinality with Applications to Contact Tracing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 47 publications
(42 citation statements)
references
References 25 publications
0
42
0
Order By: Relevance
“…The comparison is presented in Table 1. The method of evaluation followed is as explained in [9], and outlined briefly here. The Google Apple approach, DP3T, and PACT publicly release tokens of the diagnosed users, and hence they are all vulnerable to the identification of the diagnosed user.…”
Section: Implementation and Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…The comparison is presented in Table 1. The method of evaluation followed is as explained in [9], and outlined briefly here. The Google Apple approach, DP3T, and PACT publicly release tokens of the diagnosed users, and hence they are all vulnerable to the identification of the diagnosed user.…”
Section: Implementation and Evaluationmentioning
confidence: 99%
“…As a result, their PSI‐CA protocol has communication complexity O ( n log N ) which is linear in the size of the smaller set ( n ), and logarithmic in the larger set size N . However, it requires each user to perform O ( n ) exponentiations (public‐key operations) for DH‐based OPRF and O ( N ) symmetric‐key operations for keyword PIR computation. Delegated PSI‐CA [9]: Catalic, a delegated contact tracing system proposed in [9], allows multiple untrusted cloud servers to do the most of contact tracing computation so that the efficiency of the PSI‐CA protocol on the client's device can be improved. A set of non‐colluding cloud servers take the secret shares of the token from the client and jointly perform oblivious distributed key PRF (Odk‐PRF) [9] with a backend server holding a set of tokens from infected patients.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this system, for each contact between two phones, a Diffie-Hellman key exchange between is established and stored on each phone, which makes a high barrier for resource-constrained devices. Finally, the Catalic [35] is presented as a generalization of the Epione system. The main feature of the Catalic protocol is supporting resource-constrained devices that have limited capacities for computation and storage.…”
Section: Privacy In Contact Tracingmentioning
confidence: 99%
“…However, this method is difficult to directly apply since additional interactions between users are needed to calculate the intersection and the load of client computation is relatively high. Recently, private set intersection cardinality (PSI-CA) protocols for contact tracing has been proposed [ 17 , 34 ]. Another way is to use an MCFE scheme for set intersection.…”
Section: Introductionmentioning
confidence: 99%