2,365 Hits in 5.7 sec

Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach [article]

Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li
2020 IACR Cryptology ePrint Archive  
In this paper, we propose a privacy-preserving contact tracing protocol for smart phones, and more specifically Android and iOS phones.  ...  A comparative summary shows that our protocol is the most comprehensive and balanced privacy-preserving contact tracing solution to-date.  ...  In this paper, we will design a privacy-preserving COVID-19 contact tracing protocol for Bluetooth-enabled smartphone users.  ... 
dblp:journals/iacr/LiuAYZWSLL20 fatcat:j5tcmefjt5f5hhrn4xx4zbuocy

Comparative Study of Privacy Preserving-Contact Tracing on Digital Platforms

Forum Bhavesh Patel, Nilakshi Jain, Ramesh Menon, Srikanth Kodeboyina
2020 2020 International Conference on Computational Intelligence (ICCI)  
This paper presents the most popular contact tracing data privacy techniques.  ...  The rapid development in digital infrastructure such as computing power and less expensive mobile devices and explosive growth of the internet has made an impact on digital processing.  ...  A Privacy Contact Tracing: Zero-knowledge Σ-protocol It assures the users that they can have their close contacts in a way which preserves their privacy and is authenticated as well.  ... 
doi:10.1109/icci51257.2020.9247782 fatcat:zjz3lwcxbzeyjcdchgusfjfgia

A Survey on Security for Mobile Devices

Mariantonietta La Polla, Fabio Martinelli, Daniele Sgandurra
2013 IEEE Communications Surveys and Tutorials  
Nowadays, mobile devices are an important part of our everyday lives since they enable us to access a large variety of ubiquitous services.  ...  Due to the fact that this research field is immature and still unexplored in depth, with this paper we aim to provide a structured and comprehensive overview of the research on security solutions for mobile  ...  ACKNOWLEDGEMENT The authors would like to thank the anonymous reviewers for their valuable comments and suggestions, which have greatly improved the quality of the paper.  ... 
doi:10.1109/surv.2012.013012.00028 fatcat:us2g2qlglrflporo6fp6vqbdn4

SNARKs to the rescue: proof-of-contact in zero knowledge [article]

Zachary Ratliff, Joud Khoury
2020 arXiv   pre-print
We describe a decentralized protocol for "proof-of-contact" in zero knowledge where a person can publish a short cryptographic proof attesting to the fact that they have been infected and that they have  ...  More importantly, we describe how to compose these proofs to support broader functionality such as proofs of nth-order exposure which can further speed up automated contact tracing.  ...  We propose a new protocol for privacy-preserving contact tracing that does not suffer from these limitations.  ... 
arXiv:2005.12676v4 fatcat:dyxqtrzplnd25py4zg4i5uhzmy

Security in product lifecycle of IoT devices: A survey

Narges Yousefnezhad, Avleen Malhi, Kary Främling
2020 Journal of Network and Computer Applications  
A R T I C L E I N F O Index Terms: Internet of things Product lifecycle Lifecycle phases Security solutions Product lifecycle security Device security A B S T R A C T The Internet of Things (IoT) paradigm  ...  In that regard, we provide a comprehensive comparison of state-of-the-art surveys in an initial phase which concentrate on distinct parameters required for IoT security.  ...  mobile RFID network architecture embedding the reader into mobile phone, no need for proxy Niu et al. (2014) a novel ultra-lightweight and privacy-preserving authentication protocol for mobile RFID  ... 
doi:10.1016/j.jnca.2020.102779 fatcat:junhktapajc75px3n2x6j7tzou

Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience

Stephan J. Engberg, Morten Borup Harning, Christian Damsgaard Jensen
2004 Conference on Privacy, Security and Trust  
We propose a solution to the RFID privacy problem, which through zero-knowledge protocols and consumer control of keys has the potential to ensure consumer privacy needs without reducing corporate value  ...  We suggest that the in-store problem is more related to lack of privacy solutions for the consumer himself than for the RFID.  ...  Basic Zero-Knowledge Device Authentication Protocol We propose a basic zero-knowledge device authentication protocol designed for resource-constrained devices, such as RFID tags.  ... 
dblp:conf/pst/EngbergHJ04 fatcat:vqouoruarjgu3dtz7jenmqp77e

A Survey on Security and Privacy Issues in Contact Tracing Application of Covid-19

B. Sowmiya, V.S. Abhijith, S. Sudersan, R. Sakthi Jaya Sundar, M. Thangavel, P. Varalakshmi
2021 SN Computer Science  
Contact tracing apps use either a centralized or a decentralized approach to work the user's information. Apps that use a centralized approach have high privacy risks.  ...  There is major divergence among nations, however, between a "privacy-first" approach that protects citizens' information at the price of very restricted access for public health authorities and a "data-first  ...  Blockchain technology is used for data storage to ensure privacy Secure and efficient for contact tracing The identity privacy problem is protected by the combination of zero-knowledge proof and key escrow  ... 
doi:10.1007/s42979-021-00520-z pmid:33728414 pmcid:PMC7951128 fatcat:r6uhzt2vqvb7zm3egghfb22qbq

Blockchains for COVID-19 Contact Tracing and Vaccine Support: A Systematic Review

Laura Ricci, Damiano Di Francesco Maesa, Alfredo Favenza, Enrico Ferro
2021 IEEE Access  
to define robust and privacy-preserving solutions.  ...  Finally, a brief description of blockchain applications beyond contact tracing and vaccine certification is presented.  ...  A smart contract may certify the trustfulness of a Proof of Location, without breaking the user's privacy, by exploiting an interactive zero-knowledge protocol.  ... 
doi:10.1109/access.2021.3063152 pmid:34812382 pmcid:PMC8545218 fatcat:oyohv4md7fd6nljfxezod6xzxq

Vehicle-Assisted Device-to-Device Data Delivery for Smart Grid

Nan Cheng, Ning Lu, Ning Zhang, Tingting Yang, Xuemin Sherman Shen, Jon W. Mark
2016 IEEE Transactions on Vehicular Technology  
To this end, a heterogeneous communication framework is proposed, where the cellular network provides ubiquitous yet expensive data transmission and vehicle-assisted device-to-device (D2D) communications  ...  Simulation results are given to validate proposed approaches and demonstrate that the proposed framework is efficient in saving cost for the utility and offloading the cellular network.  ...  and privacy preservation.  ... 
doi:10.1109/tvt.2015.2415512 fatcat:iampyeccnzcr7owxr3r4l4qaru

Disposable Yet Official Identities (DYOI) for Privacy-Preserving System Design - The case of COVID-19 digital document verification and credential-based access control in ad hoc outdoor and indoor settings (and beyond)

Petros Kavassalis, Nikos Triantafyllou, Panagiotis Georgakopoulos, Antonis Stasis, Rob Van Kranenburg
2020 Zenodo  
"safe distance" between them and while preserving a certain privacy for the subject of control.  ...  web entity but a human agent with a smartphone, or an IoT device -- mainly in ad hoc outdoor and indoor settings.  ...  , zero-knowledge proofs).  ... 
doi:10.5281/zenodo.4016976 fatcat:nf5idotsl5grlirtc6i47dtm6m

Towards Large-Scale and Privacy-Preserving Contact Tracing in COVID-19 pandemic: A Blockchain Perspective

Wenzhe Lv, Sheng Wu, Chunxiao Jiang, Yuanhao Cui, Xuesong Qiu, Yan Zhang
2020 IEEE Transactions on Network Science and Engineering  
Specifically, 1) a privacy-preserving SRC protocol for activity-tracking and corresponding generalized block structure is developed, by connecting an interactive zero-knowledge proof protocol and the key  ...  Activity-tracking applications and location-based services using short-range communication (SRC) techniques have been abruptly demanded in the COVID-19 pandemic, especially for automated contact tracing  ...  For each submitting procedure k, a PoL note is stocked for a further zero-knowledge proof.  ... 
doi:10.1109/tnse.2020.3030925 pmid:35582326 pmcid:PMC8905609 fatcat:oagboccewvct7amrb2opax4nom

Non-Pharmaceutical Interventions against COVID-19 Pandemic: Review of Contact Tracing and Social Distancing Technologies, Protocols, Apps, Security and Open Research Directions

Uzoma Rita Alo, Friday Onwe Nkwo, Henry Friday Nweke, Ifeanyi Isaiah Achi, Henry Anayo Okemiri
2021 Sensors  
The paper critically and comprehensively reviews contact tracing technologies, protocols, and mobile applications (apps) that were recently developed and deployed against the coronavirus disease.  ...  The duo of social distancing and contact tracing are the major technological-based non-pharmaceutical public health intervention strategies adopted for combating the dreaded disease.  ...  Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach (PPC): In this protocol, subscribers generate both secrete and public keys and supply the public keys to the Government  ... 
doi:10.3390/s22010280 pmid:35009822 pmcid:PMC8749862 fatcat:y2g2oi4z2zavdc6hzju4hczb64

Trace-Σ: a privacy-preserving contact tracing app [article]

Jean-François Biasse, Sriram Chelleppan, Sherzod Kariev, Noyem Khan, Lynette Menezes, Efe Seyitoglu, Charurut Somboonwit, Attila Yavuz
2020 IACR Cryptology ePrint Archive  
We present a privacy-preserving protocol to anonymously collect information about a social graph.  ...  The typical application of our protocol is Bluetooth-enabled "contact-tracing apps" which record information about proximity between users to infer the risk of propagation of COVID-19 among them.  ...  Acknowledgment: The authors are grateful to Luca Defeo for providing insightful comments on this draft.  ... 
dblp:journals/iacr/BiasseCKKMSSY20 fatcat:m6uabqjvmfgrrlqiawrc3jouha

PE-TLBS: Secure Location Based Services Environment with Emphasis on Direct Anonymous Attestation Protocol

Hanunah Othman, Habibah Hashim, Jamalul-lail Ab Manan
2011 International Journal of Multimedia and Image Processing  
Thus, this paper presents Privacy Enhanced-Trusted Location Based Services (PE-TLBS) framework which create more trusted and privacy preserving services on top of existing Mobile Location Protocol (MLP  ...  We have initiated a virtualized Proof of Concept (PoC) environment to validate the framework.  ...  These schemes make use of zero-knowledge proofs and commitment schemes to allow the authentication of the users' attributes and privileges towards service providers, while preserving the user's privacy  ... 
doi:10.20533/ijmip.2042.4647.2011.0006 fatcat:k2cu7xvyafgsnm3vqd2dqvmmki

Decentralized Blockchain for Privacy-Preserving Large-Scale Contact Tracing [article]

Wenzhe Lv, Sheng Wu, Chunxiao Jiang, Yuanhao Cui, Xuesong Qiu, Yan Zhang
2020 arXiv   pre-print
Specifically, 1) a privacy-preserving SRC protocol for activity-tracking and corresponding generalized block structure is developed, by connecting an interactive zero-knowledge proof protocol and the key  ...  Activity-tracking applications and location-based services using short-range communication (SRC) techniques have been abruptly demanded in the COVID-19 pandemic, especially for automated contact tracing  ...  SRC based contact tracing is developing by Google and Apple [12] in a privacy-preserving fashion. However, the SRC records are stored in mobile terminals facing storage shortage problems.  ... 
arXiv:2007.00894v1 fatcat:r46sjogxhfdbfffda66hqebtpu
« Previous Showing results 1 — 15 out of 2,365 results