Introduction and Preliminaries

In this chapter, we will discuss the basic understanding of contact tracing software and the related cryptographic techniques. The underlying models of computation and communication will be explained. A standard smartphone can be considered as the basic device and there will be communication among those devices using Bluetooth technology. The data transfer between the mobile device and the backend server (might be controlled by governmental authorities) will be taken care of by the standard data communication channel provided by the service provider. Social issues related to privacy will also be touched upon in this introductory chapter.

[1]  Xiaohui Liang,et al.  EPIC: Efficient Privacy-Preserving Contact Tracing for Infection Detection , 2018, 2018 IEEE International Conference on Communications (ICC).

[2]  Guanhua Yan,et al.  Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking , 2013, IEEE Journal on Selected Areas in Communications.

[3]  Qiang Tang,et al.  Privacy-Preserving Contact Tracing: current solutions and open questions , 2020, IACR Cryptol. ePrint Arch..

[4]  Yaron Gvili,et al.  Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc , 2020, IACR Cryptol. ePrint Arch..

[5]  Mihir Bellare,et al.  The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..

[6]  Nigel P. Smart,et al.  Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) , 2005 .

[7]  Ronald L. Rivest,et al.  Spritz - a spongy RC4-like stream cipher and hash function , 2016, IACR Cryptol. ePrint Arch..

[8]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[9]  Ran Canetti,et al.  Anonymous Collocation Discovery: Harnessing Privacy to Tame the Coronavirus , 2020, 2003.13670.

[10]  Eric Horvitz,et al.  PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing , 2020, IEEE Data Eng. Bull..

[11]  Helena Handschuh SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm) , 2011, Encyclopedia of Cryptography and Security.

[12]  P. Vollmar,et al.  Virological assessment of hospitalized patients with COVID-2019 , 2020, Nature.

[13]  Hyunghoon Cho,et al.  Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs , 2020, ArXiv.

[14]  Fred Brauer,et al.  Compartmental Models in Epidemiology , 2008, Mathematical Epidemiology.

[15]  R. Emonet,et al.  Epidemic Contact Tracing via Communication Traces , 2014, PloS one.

[16]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[17]  John Black,et al.  CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions , 2000, CRYPTO.

[18]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.

[19]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[20]  Alfred Menezes,et al.  Elliptic Curve Cryptography , 2005, Encyclopedia of Cryptography and Security.

[21]  Camel Tanougast,et al.  Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG , 2017, Secur. Commun. Networks.

[22]  Robert Davidson,et al.  Getting Started with Bluetooth Low Energy , 2014 .

[23]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.