2021
DOI: 10.36227/techrxiv.14572059
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Lattice Cryptography based Geo-encrypted Contact Tracing for Infection Detection

Abstract: The world has already witnessed many epidemic diseases in the past years, like H1N1, SARS, and Ebola etc. Now, Covid-19 has also been added to list, which is declared as pandemic by World Health Organization. One of the most commonly used method to tackle the spread of such diseases is using mobile applications to perform contact tracing of the infected person. However, contact tracing applications involve transmitting sensitive location based data of the infected person to the government servers. Therefore, r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 13 publications
(11 reference statements)
0
4
0
Order By: Relevance
“…Similarly, post‐quantum lattice cryptography can be used for multiple other applications like lattice‐based geo‐encryption in a contact tracing of an infection detection, 5 which accepts latitude, longitude and distance tolerance explicitly. An important overview for the implementation of LWE‐based security 16 has been illustrated, where the private key is used for data decryption, the public key is utilized for data encryption along with various other parameters.…”
Section: Literature Surveymentioning
confidence: 99%
See 3 more Smart Citations
“…Similarly, post‐quantum lattice cryptography can be used for multiple other applications like lattice‐based geo‐encryption in a contact tracing of an infection detection, 5 which accepts latitude, longitude and distance tolerance explicitly. An important overview for the implementation of LWE‐based security 16 has been illustrated, where the private key is used for data decryption, the public key is utilized for data encryption along with various other parameters.…”
Section: Literature Surveymentioning
confidence: 99%
“…Dhiman et al 5 demonstrated a solution to perform lattice LWE based geo‐encryption applied in contact‐tracing infection detection 5 . But the model is inadequate for a mobile network and insufficient to demonstrate security against MITM and Sybil attacks.…”
Section: Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations