A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach
[article]
2020
IACR Cryptology ePrint Archive
In this paper, we propose a privacy-preserving contact tracing protocol for smart phones, and more specifically Android and iOS phones. ...
A comparative summary shows that our protocol is the most comprehensive and balanced privacy-preserving contact tracing solution to-date. ...
In this paper, we will design a privacy-preserving COVID-19 contact tracing protocol for Bluetooth-enabled smartphone users. ...
dblp:journals/iacr/LiuAYZWSLL20
fatcat:j5tcmefjt5f5hhrn4xx4zbuocy
Comparative Study of Privacy Preserving-Contact Tracing on Digital Platforms
2020
2020 International Conference on Computational Intelligence (ICCI)
This paper presents the most popular contact tracing data privacy techniques. ...
The rapid development in digital infrastructure such as computing power and less expensive mobile devices and explosive growth of the internet has made an impact on digital processing. ...
A Privacy Contact Tracing: Zero-knowledge Σ-protocol It assures the users that they can have their close contacts in a way which preserves their privacy and is authenticated as well. ...
doi:10.1109/icci51257.2020.9247782
fatcat:zjz3lwcxbzeyjcdchgusfjfgia
A Survey on Security for Mobile Devices
2013
IEEE Communications Surveys and Tutorials
Nowadays, mobile devices are an important part of our everyday lives since they enable us to access a large variety of ubiquitous services. ...
Due to the fact that this research field is immature and still unexplored in depth, with this paper we aim to provide a structured and comprehensive overview of the research on security solutions for mobile ...
ACKNOWLEDGEMENT The authors would like to thank the anonymous reviewers for their valuable comments and suggestions, which have greatly improved the quality of the paper. ...
doi:10.1109/surv.2012.013012.00028
fatcat:us2g2qlglrflporo6fp6vqbdn4
SNARKs to the rescue: proof-of-contact in zero knowledge
[article]
2020
arXiv
pre-print
We describe a decentralized protocol for "proof-of-contact" in zero knowledge where a person can publish a short cryptographic proof attesting to the fact that they have been infected and that they have ...
More importantly, we describe how to compose these proofs to support broader functionality such as proofs of nth-order exposure which can further speed up automated contact tracing. ...
We propose a new protocol for privacy-preserving contact tracing that does not suffer from these limitations. ...
arXiv:2005.12676v4
fatcat:dyxqtrzplnd25py4zg4i5uhzmy
Security in product lifecycle of IoT devices: A survey
2020
Journal of Network and Computer Applications
A R T I C L E I N F O Index Terms: Internet of things Product lifecycle Lifecycle phases Security solutions Product lifecycle security Device security A B S T R A C T The Internet of Things (IoT) paradigm ...
In that regard, we provide a comprehensive comparison of state-of-the-art surveys in an initial phase which concentrate on distinct parameters required for IoT security. ...
mobile RFID network architecture embedding the reader into mobile phone, no need for proxy Niu et al. (2014) a novel ultra-lightweight and privacy-preserving authentication protocol for mobile RFID ...
doi:10.1016/j.jnca.2020.102779
fatcat:junhktapajc75px3n2x6j7tzou
Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience
2004
Conference on Privacy, Security and Trust
We propose a solution to the RFID privacy problem, which through zero-knowledge protocols and consumer control of keys has the potential to ensure consumer privacy needs without reducing corporate value ...
We suggest that the in-store problem is more related to lack of privacy solutions for the consumer himself than for the RFID. ...
Basic Zero-Knowledge Device Authentication Protocol We propose a basic zero-knowledge device authentication protocol designed for resource-constrained devices, such as RFID tags. ...
dblp:conf/pst/EngbergHJ04
fatcat:vqouoruarjgu3dtz7jenmqp77e
A Survey on Security and Privacy Issues in Contact Tracing Application of Covid-19
2021
SN Computer Science
Contact tracing apps use either a centralized or a decentralized approach to work the user's information. Apps that use a centralized approach have high privacy risks. ...
There is major divergence among nations, however, between a "privacy-first" approach that protects citizens' information at the price of very restricted access for public health authorities and a "data-first ...
Blockchain technology is used for data storage to ensure privacy Secure and efficient for contact tracing The identity privacy problem is protected by the combination of zero-knowledge proof and key escrow ...
doi:10.1007/s42979-021-00520-z
pmid:33728414
pmcid:PMC7951128
fatcat:r6uhzt2vqvb7zm3egghfb22qbq
Blockchains for COVID-19 Contact Tracing and Vaccine Support: A Systematic Review
2021
IEEE Access
to define robust and privacy-preserving solutions. ...
Finally, a brief description of blockchain applications beyond contact tracing and vaccine certification is presented. ...
A smart contract may certify the trustfulness of a Proof of Location, without breaking the user's privacy, by exploiting an interactive zero-knowledge protocol. ...
doi:10.1109/access.2021.3063152
pmid:34812382
pmcid:PMC8545218
fatcat:oyohv4md7fd6nljfxezod6xzxq
Vehicle-Assisted Device-to-Device Data Delivery for Smart Grid
2016
IEEE Transactions on Vehicular Technology
To this end, a heterogeneous communication framework is proposed, where the cellular network provides ubiquitous yet expensive data transmission and vehicle-assisted device-to-device (D2D) communications ...
Simulation results are given to validate proposed approaches and demonstrate that the proposed framework is efficient in saving cost for the utility and offloading the cellular network. ...
and privacy preservation. ...
doi:10.1109/tvt.2015.2415512
fatcat:iampyeccnzcr7owxr3r4l4qaru
Disposable Yet Official Identities (DYOI) for Privacy-Preserving System Design - The case of COVID-19 digital document verification and credential-based access control in ad hoc outdoor and indoor settings (and beyond)
2020
Zenodo
"safe distance" between them and while preserving a certain privacy for the subject of control. ...
web entity but a human agent with a smartphone, or an IoT device -- mainly in ad hoc outdoor and indoor settings. ...
, zero-knowledge proofs). ...
doi:10.5281/zenodo.4016976
fatcat:nf5idotsl5grlirtc6i47dtm6m
Towards Large-Scale and Privacy-Preserving Contact Tracing in COVID-19 pandemic: A Blockchain Perspective
2020
IEEE Transactions on Network Science and Engineering
Specifically, 1) a privacy-preserving SRC protocol for activity-tracking and corresponding generalized block structure is developed, by connecting an interactive zero-knowledge proof protocol and the key ...
Activity-tracking applications and location-based services using short-range communication (SRC) techniques have been abruptly demanded in the COVID-19 pandemic, especially for automated contact tracing ...
For each submitting procedure k, a PoL note is stocked for a further zero-knowledge proof. ...
doi:10.1109/tnse.2020.3030925
pmid:35582326
pmcid:PMC8905609
fatcat:oagboccewvct7amrb2opax4nom
Non-Pharmaceutical Interventions against COVID-19 Pandemic: Review of Contact Tracing and Social Distancing Technologies, Protocols, Apps, Security and Open Research Directions
2021
Sensors
The paper critically and comprehensively reviews contact tracing technologies, protocols, and mobile applications (apps) that were recently developed and deployed against the coronavirus disease. ...
The duo of social distancing and contact tracing are the major technological-based non-pharmaceutical public health intervention strategies adopted for combating the dreaded disease. ...
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach (PPC): In this protocol, subscribers generate both secrete and public keys and supply the public keys to the Government ...
doi:10.3390/s22010280
pmid:35009822
pmcid:PMC8749862
fatcat:y2g2oi4z2zavdc6hzju4hczb64
Trace-Σ: a privacy-preserving contact tracing app
[article]
2020
IACR Cryptology ePrint Archive
We present a privacy-preserving protocol to anonymously collect information about a social graph. ...
The typical application of our protocol is Bluetooth-enabled "contact-tracing apps" which record information about proximity between users to infer the risk of propagation of COVID-19 among them. ...
Acknowledgment: The authors are grateful to Luca Defeo for providing insightful comments on this draft. ...
dblp:journals/iacr/BiasseCKKMSSY20
fatcat:m6uabqjvmfgrrlqiawrc3jouha
PE-TLBS: Secure Location Based Services Environment with Emphasis on Direct Anonymous Attestation Protocol
2011
International Journal of Multimedia and Image Processing
Thus, this paper presents Privacy Enhanced-Trusted Location Based Services (PE-TLBS) framework which create more trusted and privacy preserving services on top of existing Mobile Location Protocol (MLP ...
We have initiated a virtualized Proof of Concept (PoC) environment to validate the framework. ...
These schemes make use of zero-knowledge proofs and commitment schemes to allow the authentication of the users' attributes and privileges towards service providers, while preserving the user's privacy ...
doi:10.20533/ijmip.2042.4647.2011.0006
fatcat:k2cu7xvyafgsnm3vqd2dqvmmki
Decentralized Blockchain for Privacy-Preserving Large-Scale Contact Tracing
[article]
2020
arXiv
pre-print
Specifically, 1) a privacy-preserving SRC protocol for activity-tracking and corresponding generalized block structure is developed, by connecting an interactive zero-knowledge proof protocol and the key ...
Activity-tracking applications and location-based services using short-range communication (SRC) techniques have been abruptly demanded in the COVID-19 pandemic, especially for automated contact tracing ...
SRC based contact tracing is developing by Google and Apple [12] in a privacy-preserving fashion. However, the SRC records are stored in mobile terminals facing storage shortage problems. ...
arXiv:2007.00894v1
fatcat:r46sjogxhfdbfffda66hqebtpu
« Previous
Showing results 1 — 15 out of 2,365 results