skip to main content
10.1145/3407023.3409204acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

A note on blind contact tracing at scale with applications to the COVID-19 pandemic

Published:25 August 2020Publication History

ABSTRACT

The current COVID-19 pandemic highlights the utility of contact tracing, when combined with case isolation and social distancing, as an important tool for mitigating the spread of a disease [1]. Contact tracing provides a mechanism of identifying individuals with a high likelihood of previous exposure to a contagious disease, allowing additional precautions to be put in place to prevent continued transmission.

Here we consider a cryptographic approach to contact tracing based on secure two-party computation (2PC). We begin by considering the problem of comparing a set of location histories held by two parties to determine whether they have come within some threshold distance while at the same time maintaining the privacy of the location histories. We propose a solution to this problem using pre-shared keys, adapted from an equality testing protocol due to Ishai et al [2]. We discuss how this protocol can be used to maintain privacy within practical contact tracing scenarios, including both app-based approaches and approaches which leverage location history held by telecoms and internet service providers. We examine the efficiency of this approach and show that existing infrastructure is sufficient to support anonymised contact tracing at a national level.

References

  1. Luca Ferretti, Chris Wymant, Michelle Kendall, Lele Zhao, Anel Nurtay, Lucie Abeler-Dörner, Michael Parker, David Bonsall, and Christophe Fraser. Quantifying sars-cov-2 transmission suggests epidemic control with digital contact tracing. Science, 2020.Google ScholarGoogle Scholar
  2. Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Claudio Orlandi, and Anat Paskin-Cherniavsky. On the power of correlated randomness in secure computation. In Theory of Cryptography Conference, pages 600--620. Springer, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Neil Ferguson, Daniel Laydon, Gemma Nedjati Gilani, Natsuko Imai, Kylie Ainslie, Marc Baguelin, Sangeeta Bhatia, Adhiratha Boonyasiri, ZULMA Cucunuba Perez, Gina Cuomo-Dannenburg, et al. Report 9: Impact of non-pharmaceutical interventions (NPIs) to reduce COVID19 mortality and healthcare demand. 2020.Google ScholarGoogle Scholar
  4. Patrick Walker, Charles Whittaker, Oliver Watson, Marc Baguelin, et al. Report 12 - the global impact of covid-19 and strategies for mitigation and suppression. 2020.Google ScholarGoogle Scholar
  5. BBC News. Coronavirus privacy: Are South Korea's alerts too revealing?, 2020. Available at https://www.bbc.com/news/world-asia-51733145.Google ScholarGoogle Scholar
  6. McKinsey Global Institute. Digital india: Technology to transform a connected nation. 2019.Google ScholarGoogle Scholar
  7. Anabela Berenguer, Jorge Goncalves, Simo Hosio, Denzil Ferreira, Theodoras Anagnostopoulos, and Vassilis Kostakos. Are smartphones ubiquitous?: An in-depth survey of smartphone adoption by seniors. IEEE Consumer Electronics Magazine, 6(1):104--110, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  8. World Health Organization. Statement - older people are at highest risk from COVID-19, but all must act to prevent community spread, 2020. Available at http://www.euro.who.int/en/health-topics/health-emergencies/coronavirus-covid-19/statements/statement-older-people-are-at-highest-risk-from-covid-19,-but-all-must-act-to-prevent-community-spread.Google ScholarGoogle Scholar
  9. Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, Dan Boneh, et al. Location privacy via private proximity testing. In NDSS, volume 11, 2011.Google ScholarGoogle Scholar
  10. Roger W Sinnott. Sky and telescope. Virtues of the Haversine, 68(2):159, 1984.Google ScholarGoogle Scholar
  11. Available at https://www.tracetogether.gov.sg/.Google ScholarGoogle Scholar
  12. Source Code available at https://github.com/ProteGO-app.Google ScholarGoogle Scholar
  13. James Bell, David Butler, Chris Hicks, and Jon Crowcroft. Tracesecure: Towards privacy preserving contact tracing, 2020.Google ScholarGoogle Scholar
  14. Justin Chan, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Sudheesh Singanamalla, Jacob Sunshine, and Stefano Tessaro. Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing, 2020.Google ScholarGoogle Scholar
  15. MIT. Apps gone rogue: Maintaining persoanl privacy in an epidemic, 2020. Whitepaper available at https://safepaths.mit.edu/.Google ScholarGoogle Scholar
  16. Alex Berke, Michiel Bakker, Praneeth Vepakomma, Ramesh Raskar, Kent Larson, and Alex 'Sandy' Pentland. Assessing disease exposure risk with location data: A proposal for cryptographic preservation of privacy, 2020.Google ScholarGoogle Scholar
  17. Jaroslav Šeděnka and Paolo Gasti. Privacy-preserving distance computation and proximity testing on earth, done right. In Proceedings of the 9th ACM symposium on Information, computer and communications security, pages 99--110, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Commanding Officer, Naval Reserve Personnel Center, Marine Corps, US Headquarters, Coast Guard, and US Coast Guard. The Code of Federal Regulations of the United States of America.Google ScholarGoogle Scholar
  19. Yehuda Lindell. How to simulate it-a tutorial on the simulation proof technique. In Tutorials on the Foundations of Cryptography, pages 277--346. Springer, 2017.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and Security
    August 2020
    1073 pages
    ISBN:9781450388337
    DOI:10.1145/3407023
    • Program Chairs:
    • Melanie Volkamer,
    • Christian Wressnegger

    Copyright © 2020 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 25 August 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate228of451submissions,51%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader