Proceedings 2021 Innovative Secure IT Technologies Against COVID-19 Workshop 2021
DOI: 10.14722/coronadef.2021.23010
|View full text |Cite
|
Sign up to set email alerts
|

Ovid: Message-based Automatic Contact Tracing

Abstract: The COVID-19 pandemic created various new challenges for our societies. Quickly discovering new infections using automated contact tracing without endangering privacy of the general public is one of these. Most discussions concerning architectures for contact tracing applications revolved around centralized against decentralized approaches. In contrast, the system proposed in this work builds on the idea of messagebased contact tracing to inform users about their risk. Our main contribution is the combination … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Advanced Privacy Techniques. There are several (mainly cryptography-based) privacy techniques that have been considered to enhance privacy of DCT, e.g., Blind signatures [28], [25], Blockchain [25], Private Set Intersection (PSI)/filter [27], and secret sharing [19]. Unfortunately, none of these contact tracing approaches have been used in practice yet.…”
Section: Systematization Of Contact Tracing Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…Advanced Privacy Techniques. There are several (mainly cryptography-based) privacy techniques that have been considered to enhance privacy of DCT, e.g., Blind signatures [28], [25], Blockchain [25], Private Set Intersection (PSI)/filter [27], and secret sharing [19]. Unfortunately, none of these contact tracing approaches have been used in practice yet.…”
Section: Systematization Of Contact Tracing Schemesmentioning
confidence: 99%
“…However, this threat can be effectively mitigated by applying appropriate anonymization techniques like blind signatures with an anonymous postbox service [28] to the upload process of encounter tokens. This assures that even a malicious service provider A 𝑠 cannot link individual encounter tokens of infected users, thereby limiting the trackability of individual system users to relatively short time frames of, e.g., 15 minutes.…”
Section: A Advantages Of Dh-based Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally,(WANG; LYU; LIU, 2019) presents the DGS topic from an information theory perspective, and (CHEN, 2019) approaches the decision versions of RLWE with possible DGS primitives, questioning the hardness for some cyclotomic number fields and specific DGS interval widths. Further insights on DGS implementation, regarding generic and specific prerequisites, e.g., isochrony and CDT implications, are offered by (REPARAZ;BALASCH;VERBAUWHEDE, 2016;KARMAKAR et al, 2018;WALTER, 2018;WANG;, and also by two C language implementations, namely the GNU Scientific Library (GSL) (GALASSI; THEILER, 2019), and the Open Quantum Safe library (liboqs) (STEBILA; MOSCA,…”
Section: Discrete Gaussian Sampling In Lattice-based Cryptographymentioning
confidence: 99%
“…Mitigation measures to timing and other sidechannel attacks can be implemented in application, operating system, and hardware levels. As an LWE-based proposal, this work addresses timing-attack risks through vulnerability-reduction measures in the application level, implementing isochrony in parts of its construction (ORTIZ, 2016;REPARAZ;BALASCH;VERBAUWHEDE, 2016).…”
Section: Mitigation Of Timing Side-channel Attacksmentioning
confidence: 99%