scholarly journals PCT-TEE: Trajectory-based Private Contact Tracing System with Trusted Execution Environment

2022 ◽  
Vol 8 (2) ◽  
pp. 1-35
Author(s):  
Fumiyuki Kato ◽  
Yang Cao ◽  
Mastoshi Yoshikawa

Existing Bluetooth-based private contact tracing (PCT) systems can privately detect whether people have come into direct contact with patients with COVID-19. However, we find that the existing systems lack functionality and flexibility , which may hurt the success of contact tracing. Specifically, they cannot detect indirect contact (e.g., people may be exposed to COVID-19 by using a contaminated sheet at a restaurant without making direct contact with the infected individual); they also cannot flexibly change the rules of “risky contact,” such as the duration of exposure or the distance (both spatially and temporally) from a patient with COVID-19 that is considered to result in a risk of exposure, which may vary with the environmental situation. In this article, we propose an efficient and secure contact tracing system that enables us to trace both direct contact and indirect contact. To address the above problems, we need to utilize users’ trajectory data for PCT, which we call trajectory-based PCT . We formalize this problem as a spatiotemporal private set intersection that satisfies both the security and efficiency requirements. By analyzing different approaches such as homomorphic encryption, which could be extended to solve this problem, we identify the trusted execution environment (TEE) as a candidate method to achieve our requirements. The major challenge is how to design algorithms for a spatiotemporal private set intersection under the limited secure memory of the TEE. To this end, we design a TEE-based system with flexible trajectory data encoding algorithms. Our experiments on real-world data show that the proposed system can process hundreds of queries on tens of millions of records of trajectory data within a few seconds.

Entropy ◽  
2020 ◽  
Vol 22 (12) ◽  
pp. 1339
Author(s):  
Yunlu Cai ◽  
Chunming Tang ◽  
Qiuxia Xu

A two-party private set intersection allows two parties, the client and the server, to compute an intersection over their private sets, without revealing any information beyond the intersecting elements. We present a novel private set intersection protocol based on Shuhong Gao’s fully homomorphic encryption scheme and prove the security of the protocol in the semi-honest model. We also present a variant of the protocol which is a completely novel construction for computing the intersection based on Bloom filter and fully homomorphic encryption, and the protocol’s complexity is independent of the set size of the client. The security of the protocols relies on the learning with errors and ring learning with error problems. Furthermore, in the cloud with malicious adversaries, the computation of the private set intersection can be outsourced to the cloud service provider without revealing any private information.


2021 ◽  
pp. 352-373
Author(s):  
Jonathan Takeshita ◽  
Ryan Karl ◽  
Alamin Mohammed ◽  
Aaron Striegel ◽  
Taeho Jung

2020 ◽  
Vol 2 (2) ◽  
Author(s):  
Sitaram Khadka ◽  
Hamid Saeed ◽  
Yogesh Bajgain ◽  
Janak Shahi ◽  
Tank Prasad Yadav ◽  
...  

Coronavirus disease (COVID-19) is a respiratory infectious ailment caused by severe acute respiratory syndrome coronavirus-2 (SARS-CoV-2). The first outbreak of this disease occurred in China and declared a pandemic in a very short period of time. SARS-CoV-2 gets transmitted mainly through the respiratory tract by droplets or respiratory secretions and by direct contact with the infected person as well as indirect contact through touching the contaminated surface accompanied by poor hygiene practice. Until the vaccine, a therapeutic agent or any other treatment modality gets approved; contact tracing and management, social distancing, personal hygiene, respiratory etiquette, and environmental decontamination are the prime factors to be considered for transmission containment and hence for appropriate safety measures for COVID-19 which is possible with the support of social work from the community level.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Ou Ruan ◽  
Hao Mao

Private set intersection (PSI) allows participants to securely compute the intersection of their inputs, which has a wide range of applications such as privacy-preserving contact tracing of COVID-19. Most existing PSI protocols were based on asymmetric/symmetric cryptosystem. Therefore, keys-related operations would burden these systems. In this paper, we transform the problem of the intersection of sets into the problem of finding roots of polynomials by using point-value polynomial representation, blind polynomials’ point-value pairs for secure transportation and computation with the pseudorandom function, and then propose an efficient PSI protocol without any cryptosystem. We optimize the protocol based on the permutation-based hash technique which divides a set into multisubsets to reduce the degree of the polynomial. The following advantages can be seen from the experimental result and theoretical analysis: (1) there is no cryptosystem for data hiding or encrypting and, thus, our design provides a lightweight system; (2) with set elements less than 212, our protocol is highly efficient compared to the related protocols; and (3) a detailed formal proof is given in the semihonest model.


Sign in / Sign up

Export Citation Format

Share Document