2021 International Conference on Information Networking (ICOIN) 2021
DOI: 10.1109/icoin50884.2021.9333939
|View full text |Cite
|
Sign up to set email alerts
|

Cross Hashing: Anonymizing encounters in Decentralised Contact Tracing Protocols

Abstract: During the COVID-19 (SARS-CoV-2) epidemic, Contact Tracing emerged as an essential tool for managing the epidemic. App-based solutions have emerged for Contact Tracing, including a protocol designed by Apple and Google (influenced by an open-source protocol known as DP3T). This protocol contains two well-documented de-anonymisation attacks. Firstly that when someone is marked as having tested positive and their keys are made public, they can be tracked over a large geographic area for 24 hours at a time. Secon… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…However, by doing so, the users will also be able to reconstruct the entire daily trajectory of the infected user. The problem has been addressed in our recent work [4], where we proposed a cross-hashing approach, in which the daily temporal key is kept secret at all times. Instead, in case of infection, a user reveals cross-contact identifiers (CCI), which are obtained by hashing sequential randomised identifiers.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…However, by doing so, the users will also be able to reconstruct the entire daily trajectory of the infected user. The problem has been addressed in our recent work [4], where we proposed a cross-hashing approach, in which the daily temporal key is kept secret at all times. Instead, in case of infection, a user reveals cross-contact identifiers (CCI), which are obtained by hashing sequential randomised identifiers.…”
Section: Related Workmentioning
confidence: 99%
“…This configuration assumes beaconing at 1 Hz frequency combined with continuous scanning. The second, third and (5,6) 806,185 4,030,925 t=10, (3,6) 662,295 6,622,950 t=10, (4,6) 612,878 6,128,780 t=10, (5,6) 537,860 5,378,600 t=20, (3,6) 379,854 7,597,080 t=20, (4,6) 355,480 7,109,600 t=20, (5,6) 323, 788 6,475,760 fourth sections in the table show the effect of a more practical configuration, where a scanner needs to receive k out of n shares, when each share is transmitted for t seconds (i.e. t times).…”
Section: A Spatio-temporal Exposure Reductionmentioning
confidence: 99%
See 2 more Smart Citations
“…From tracking through questionnaires [2] in the 20th century, it has gradually evolved into tracking using digital mobile devices after 2010 [3]- [5]. From 2020, to reduce COVID-19-associated mortality, a variety of tracing approaches have emerged [6]- [8]. These solutions rely on Bluetooth Low Energy (BLE) to broadcast and record frequently changing anonymous identifiers.…”
Section: Introductionmentioning
confidence: 99%