A note on blind contact tracing at scale with applications to the COVID-19 pandemic

The current COVID-19 pandemic highlights the utility of contact tracing, when combined with case isolation and social distancing, as an important tool for mitigating the spread of a disease [1]. Contact tracing provides a mechanism of identifying individuals with a high likelihood of previous exposure to a contagious disease, allowing additional precautions to be put in place to prevent continued transmission. Here we consider a cryptographic approach to contact tracing based on secure two-party computation (2PC). We begin by considering the problem of comparing a set of location histories held by two parties to determine whether they have come within some threshold distance while at the same time maintaining the privacy of the location histories. We propose a solution to this problem using pre-shared keys, adapted from an equality testing protocol due to Ishai et al [2]. We discuss how this protocol can be used to maintain privacy within practical contact tracing scenarios, including both app-based approaches and approaches which leverage location history held by telecoms and internet service providers. We examine the efficiency of this approach and show that existing infrastructure is sufficient to support anonymised contact tracing at a national level.

[1]  Paolo Gasti,et al.  Privacy-preserving distance computation and proximity testing on earth, done right , 2014, AsiaCCS.

[2]  Eric Horvitz,et al.  PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing , 2020, IEEE Data Eng. Bull..

[3]  Dan Boneh,et al.  Location Privacy via Private Proximity Testing , 2011, NDSS.

[4]  S. Bhatt,et al.  Report 12: The global impact of COVID-19 and strategies for mitigation and suppression , 2020 .

[5]  Yehuda Lindell,et al.  How To Simulate It - A Tutorial on the Simulation Proof Technique , 2016, IACR Cryptol. ePrint Arch..

[6]  Lucie Abeler-Dörner,et al.  Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing , 2020, Science.

[7]  Anat Paskin-Cherniavsky,et al.  On the Power of Correlated Randomness in Secure Computation , 2013, TCC.

[8]  Ramesh Raskar,et al.  Apps Gone Rogue: Maintaining Personal Privacy in an Epidemic , 2020, ArXiv.

[9]  Alex 'Sandy' Pentland,et al.  Assessing Disease Exposure Risk with Location Data: A Proposal for Cryptographic Preservation of Privacy , 2020, 2003.14412.

[10]  Ramesh Raskar,et al.  Assessing Disease Exposure Risk With Location Histories And Protecting Privacy: A Cryptographic Approach In Response To A Global Pandemic , 2020, ArXiv.

[11]  Tony Flanders,et al.  Sky and Telescope , 2006 .

[12]  David Butler,et al.  TraceSecure: Towards Privacy Preserving Contact Tracing , 2020, ArXiv.

[13]  C. Whittaker,et al.  Report 9: Impact of non-pharmaceutical interventions (NPIs) to reduce COVID19 mortality and healthcare demand , 2020 .

[14]  Simo Hosio,et al.  Are Smartphones Ubiquitous?: An in-depth survey of smartphone adoption by seniors , 2017, IEEE Consumer Electronics Magazine.