ABSTRACT
The current COVID-19 pandemic highlights the utility of contact tracing, when combined with case isolation and social distancing, as an important tool for mitigating the spread of a disease [1]. Contact tracing provides a mechanism of identifying individuals with a high likelihood of previous exposure to a contagious disease, allowing additional precautions to be put in place to prevent continued transmission.
Here we consider a cryptographic approach to contact tracing based on secure two-party computation (2PC). We begin by considering the problem of comparing a set of location histories held by two parties to determine whether they have come within some threshold distance while at the same time maintaining the privacy of the location histories. We propose a solution to this problem using pre-shared keys, adapted from an equality testing protocol due to Ishai et al [2]. We discuss how this protocol can be used to maintain privacy within practical contact tracing scenarios, including both app-based approaches and approaches which leverage location history held by telecoms and internet service providers. We examine the efficiency of this approach and show that existing infrastructure is sufficient to support anonymised contact tracing at a national level.
- Luca Ferretti, Chris Wymant, Michelle Kendall, Lele Zhao, Anel Nurtay, Lucie Abeler-Dörner, Michael Parker, David Bonsall, and Christophe Fraser. Quantifying sars-cov-2 transmission suggests epidemic control with digital contact tracing. Science, 2020.Google Scholar
- Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Claudio Orlandi, and Anat Paskin-Cherniavsky. On the power of correlated randomness in secure computation. In Theory of Cryptography Conference, pages 600--620. Springer, 2013.Google ScholarDigital Library
- Neil Ferguson, Daniel Laydon, Gemma Nedjati Gilani, Natsuko Imai, Kylie Ainslie, Marc Baguelin, Sangeeta Bhatia, Adhiratha Boonyasiri, ZULMA Cucunuba Perez, Gina Cuomo-Dannenburg, et al. Report 9: Impact of non-pharmaceutical interventions (NPIs) to reduce COVID19 mortality and healthcare demand. 2020.Google Scholar
- Patrick Walker, Charles Whittaker, Oliver Watson, Marc Baguelin, et al. Report 12 - the global impact of covid-19 and strategies for mitigation and suppression. 2020.Google Scholar
- BBC News. Coronavirus privacy: Are South Korea's alerts too revealing?, 2020. Available at https://www.bbc.com/news/world-asia-51733145.Google Scholar
- McKinsey Global Institute. Digital india: Technology to transform a connected nation. 2019.Google Scholar
- Anabela Berenguer, Jorge Goncalves, Simo Hosio, Denzil Ferreira, Theodoras Anagnostopoulos, and Vassilis Kostakos. Are smartphones ubiquitous?: An in-depth survey of smartphone adoption by seniors. IEEE Consumer Electronics Magazine, 6(1):104--110, 2016.Google ScholarCross Ref
- World Health Organization. Statement - older people are at highest risk from COVID-19, but all must act to prevent community spread, 2020. Available at http://www.euro.who.int/en/health-topics/health-emergencies/coronavirus-covid-19/statements/statement-older-people-are-at-highest-risk-from-covid-19,-but-all-must-act-to-prevent-community-spread.Google Scholar
- Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, Dan Boneh, et al. Location privacy via private proximity testing. In NDSS, volume 11, 2011.Google Scholar
- Roger W Sinnott. Sky and telescope. Virtues of the Haversine, 68(2):159, 1984.Google Scholar
- Available at https://www.tracetogether.gov.sg/.Google Scholar
- Source Code available at https://github.com/ProteGO-app.Google Scholar
- James Bell, David Butler, Chris Hicks, and Jon Crowcroft. Tracesecure: Towards privacy preserving contact tracing, 2020.Google Scholar
- Justin Chan, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Sudheesh Singanamalla, Jacob Sunshine, and Stefano Tessaro. Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing, 2020.Google Scholar
- MIT. Apps gone rogue: Maintaining persoanl privacy in an epidemic, 2020. Whitepaper available at https://safepaths.mit.edu/.Google Scholar
- Alex Berke, Michiel Bakker, Praneeth Vepakomma, Ramesh Raskar, Kent Larson, and Alex 'Sandy' Pentland. Assessing disease exposure risk with location data: A proposal for cryptographic preservation of privacy, 2020.Google Scholar
- Jaroslav Šeděnka and Paolo Gasti. Privacy-preserving distance computation and proximity testing on earth, done right. In Proceedings of the 9th ACM symposium on Information, computer and communications security, pages 99--110, 2014.Google ScholarDigital Library
- Commanding Officer, Naval Reserve Personnel Center, Marine Corps, US Headquarters, Coast Guard, and US Coast Guard. The Code of Federal Regulations of the United States of America.Google Scholar
- Yehuda Lindell. How to simulate it-a tutorial on the simulation proof technique. In Tutorials on the Foundations of Cryptography, pages 277--346. Springer, 2017.Google ScholarCross Ref
Recommendations
Applicability of mobile contact tracing in fighting pandemic (COVID-19): Issues, challenges and solutions
AbstractContact Tracing is considered as the first and the most effective step towards containing an outbreak, as resources for mass testing and large quantity of vaccines are highly unlikely available for immediate utilization. Effective ...
A centralized contact-tracing protocol for the COVID-19 pandemic
AbstractDigital contact tracing (DCT) is one of the weapons to be used against the COVID-19 pandemic, especially in a post-lockdown phase, to prevent or block foci of infection. As DCT systems can handle highly private information about people,...
Catalic: Delegated PSI Cardinality with Applications to Contact Tracing
Advances in Cryptology – ASIACRYPT 2020AbstractPrivate Set Intersection Cardinality (PSI-CA) allows two parties, each holding a set of items, to learn the size of the intersection of those sets without revealing any additional information. To the best of our knowledge, this work presents the ...
Comments