2020
DOI: 10.48550/arxiv.2005.12273
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Decentralized Privacy-Preserving Proximity Tracing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
69
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(69 citation statements)
references
References 0 publications
0
69
0
Order By: Relevance
“…The runtimes of the LS/LS+ algorithms are also much lower than the baselines and do not depend on the network size since they are local algorithms -as opposed to the baselines, which have quadratic or even larger dependence on the network size. The "low-tech" approach in the design of the LS/LS+ algorithms increases their potential to be implemented in real-world scenarios, possibly even in a decentralized way, similarly to contact tracing smart phone applications [41], which is an interesting direction for future work. ), the middle household contains no symptomatic node (only the asymptomatic node 𝑣 3 ), but the LS+ algorithm still succeeds.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The runtimes of the LS/LS+ algorithms are also much lower than the baselines and do not depend on the network size since they are local algorithms -as opposed to the baselines, which have quadratic or even larger dependence on the network size. The "low-tech" approach in the design of the LS/LS+ algorithms increases their potential to be implemented in real-world scenarios, possibly even in a decentralized way, similarly to contact tracing smart phone applications [41], which is an interesting direction for future work. ), the middle household contains no symptomatic node (only the asymptomatic node 𝑣 3 ), but the LS+ algorithm still succeeds.…”
Section: Discussionmentioning
confidence: 99%
“…During the COVID-19 pandemic, we have seen a revolution of the contact tracing technology, which helped track and contain the epidemic [6,19]. Some contact tracing programs were conducted by governmental/health agencies [30], while others relied on decentralized approaches [41]. Most contact tracing approaches work by notifying people who could have received the infection from known infectious patients, i.e., they trace "forward" in time.…”
Section: Introductionmentioning
confidence: 99%
“…As with all security solutions, the privacy guarantees of GAEN are relative. There certainly exist extreme scenarios (e.g., [3], [6], [7], [8], [19], [20]) where attackers may learn additional information. If an adversary has access to RPIs, TEKs, and RPI date-time information read by (say) thousands of users, then the adversary can profile a user's movement [3], [7], [6].…”
Section: Gaen's Privacy Wrt Threat Modelsmentioning
confidence: 99%
“…Hence, user privacy is preserved in the Some attack scenarios in Table 1 have rather strong assumptions regarding the complexity of the attack setup and demand huge resources. For example, attackers in the Organized Crime I model (ID 5) require TEKs and aggregated data in each 10 to 20-minute time window to deanonymize infected users [3], [6], [7]. Aggregated data include public and sensitive information, such as date, time, interaction graph, social graph, address, location type (e.g., residential, workplace, and library), and surveillance cameras.…”
Section: Gaen's Privacy Wrt Threat Modelsmentioning
confidence: 99%
See 1 more Smart Citation