1. bookVolume 2021 (2021): Issue 4 (October 2021)
Journal Details
License
Format
Journal
First Published
16 Apr 2015
Publication timeframe
4 times per year
Languages
English
access type Open Access

CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing

Published Online: 23 Jul 2021
Page range: 350 - 368
Received: 28 Feb 2021
Accepted: 16 Jun 2021
Journal Details
License
Format
Journal
First Published
16 Apr 2015
Publication timeframe
4 times per year
Languages
English
Abstract

There is growing evidence that SARS-CoV-2 can be transmitted beyond close proximity contacts, in particular in closed and crowded environments with insufficient ventilation. To help mitigation efforts, contact tracers need a way to notify those who were present in such environments at the same time as infected individuals. Neither traditional human-based contact tracing powered by handwritten or electronic lists, nor Bluetooth-enabled proximity tracing can handle this problem efficiently. In this paper, we propose CrowdNotifier, a protocol that can complement manual contact tracing by efficiently notifying visitors of venues and events with SARS-CoV-2-positive attendees. We prove that CrowdNotifier provides strong privacy and abuse-resistance, and show that it can scale to handle notification at a national scale.

Keywords

[1] Michel Abdalla, Mihir Bellare, and Gregory Neven. Robust Encryption. J. Cryptol., 31(2):307–350, 2018. Search in Google Scholar

[2] Dillon Adam, Peng Wu, Jessica Wong, Eric Lau, Tim Tsang, Simon Cauchemez, Gabriel Leung, and Benjamin Cowling. Clustering and superspreading potential of SARS-CoV-2 infections in Hong Kong. Nature Medicine, 26:1714–1719, 2020. Search in Google Scholar

[3] Gilles Barthe, Roberta De Viti, Peter Druschel, Deepak Garg, Manuel Gomez-Rodriguez, Pierfrancesco Ingo, Matthew Lentz, Aastha Mehta, and Bernhard Schölkopf. PanCast: Listening to Bluetooth Beacons for Epidemic Risk Mitigation. CoRR, abs/2011.08069, 2020. Search in Google Scholar

[4] Dan Boneh and Matthew K. Franklin. Identity-Based Encryption from the Weil Pairing. In CRYPTO, 2001. Search in Google Scholar

[5] Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, and Daniel J. Weitzner. Privacy-Preserving Automated Exposure Notification. IACR ePrint, 2020:863, 2020. Search in Google Scholar

[6] Claude Castelluccia, Nataliia Bielova, Antoine Boutet, Mathieu Cunche, Cédric Lauradoux, Daniel Le Métayer, and Vincent Roca. DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems. CoRR, abs/2008.01621, 2020. Search in Google Scholar

[7] Justin Chan, Dean P. Foster, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham M. Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Sudheesh Singanamalla, Jacob E. Sunshine, and Stefano Tessaro. PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing. CoRR, abs/2004.03544, 2020. Search in Google Scholar

[8] Rahul Chatterjee, Periwinkle Doerfler, Hadas Orgad, Sam Havron, Jackeline Palmer, Diana Freed, Karen Levy, Nicola Dell, Damon McCoy, and Thomas Ristenpart. The Spyware Used in Intimate Partner Violence. In S&P 2018. IEEE Computer Society, 2018. Search in Google Scholar

[9] Andrew Tzer-Yeu Chen. How Fragmentation Can Undermine the Public Health Response to COVID-19. CoRR, abs/2009.06279, 2020. Search in Google Scholar

[10] culture4life. luca Security Concept. https://luca-app.de/ and https://luca-app.de/securityconcept accessed March 11, 2021. Search in Google Scholar

[11] Paul-Olivier Dehaye and Joel Reardon. Proximity Tracing in an Ecosystem of Surveillance Capitalism. In WPES, 2020. Search in Google Scholar

[12] Diana Freed, Jackeline Palmer, Diana Elizabeth Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. “A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology. In CHI, 2018. Search in Google Scholar

[13] Rosario Gennaro, Adam Krellenstein, and James Krellenstein. Exposure Notification System May Allow for Large-Scale Voter Suppression. Talk at Real World Crypto 2021. Search in Google Scholar

[14] Google and Apple. Exposure Notifications: Using technology to help public health authorities fight COVID-19, 2020. https://www.google.com/covid19/exposurenotifications/. Search in Google Scholar

[15] The Health Protection (Coronavirus, Collection of Contact Details etc and Related Requirements) Regulations 2020. https://www.legislation.gov.uk/uksi/2020/1005/made. Search in Google Scholar

[16] Nemo Kim. South Korea struggles to contain new outbreak amid anti-gay backlash. https://www.theguardian.com/world/2020/may/11/south-korea-struggles-to-contain-new-outbreak-amid-anti-lgbt-backlash accessed March 11, 2021. Search in Google Scholar

[17] Karen Levy and Bruce Schneier. Privacy threats in intimate relationships. J. Cybersecur., 6(1), 2020. Search in Google Scholar

[18] Linux Foundation. LF Public Health Landscape. https://landscape.lfph.io/ accessed March 11, 2021. Search in Google Scholar

[19] Shigeo Mitsunari. mcl: a portable and fast pairing-based cryptography library. https://github.com/herumi/mcl. Search in Google Scholar

[20] NHS. NHS COVID-19 app. https://covid19.nhs.uk/, accessed March 11, 2021. Search in Google Scholar

[21] New Zealand Ministry of Health. NZ COVID Tracer app. https://www.health.govt.nz/our-work/diseases-and-conditions/covid-19-novel-coronavirus/covid-19-resources-and-tools/nz-covid-tracer-app, acccessed March 11, 2021. Search in Google Scholar

[22] Government of Singapore. SafeEntry. https://www.safeentry.gov.sg/ accessed March 11, 2020. Search in Google Scholar

[23] Kenneth G. Paterson and Sriramkrishnan Srinivasan. Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. In Pairing, 2008. Search in Google Scholar

[24] Kimberly A Prather, Linsey C Marr, Robert T Schooley, Melissa A McDiarmid, Mary E Wilson, and Donald K Milton. Airborne transmission of SARS-CoV-2. Science, 370(6514):303, 2020. Search in Google Scholar

[25] La Rioja. Cómo funciona COVID-19 QR, el sistema que deberías usar al entrar a un bar. https://www.larioja.com/la-rioja/coronavirus/conoce-funciona-covid19-20201125124800-nt.html accessed March 11, 2020. Search in Google Scholar

[26] Vincent Roca, Antoine Boutet, and Claude Castelluccia. The Cluster Exposure Verification (Cléa) Protocol: Specifications of the Lightweight Version, 2021. https://hal.inria.fr/hal-03146022. Search in Google Scholar

[27] SocialPass. https://www.socialpass.ch/ accessed March 11, 2020. Search in Google Scholar

[28] DP3T Team. Privacy and Security Risk Evaluation of Digital Proximity Tracing Systems, 2020. Version April 21, 2020. Available from https://github.com/DP-3T/documents/blob/master/Security%20analysis/Privacy%20and%20Security%20Attacks%20on%20Digital%20Proximity%20Tracing%20Systems.pdf. Search in Google Scholar

[29] Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, and José Pereira. Decentralized Privacy-Preserving Proximity Tracing. CoRR, abs/2005.12273, 2020. Search in Google Scholar

[30] Felix Wong and James J Collins. Evidence that coronavirus superspreading is fat-tailed. Proceedings of the National Academy of Sciences, 117(47):29416–29418, 2020. Search in Google Scholar

[31] Chris Wymant, Luca Ferretti, Daphne Tsallis, Marcos Char-alambides, Lucie Abeler-Dörner, David Bonsal, Hinch, Michelle Kendall, Luke Milsom, Matthew Ayres, Chris Holmes, Mark Briers, and Christophe Fraser. The epidemio-logical impact of the NHS COVID-19 app. Nature, 2021. Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo