{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:59:28Z","timestamp":1743083968110,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030932053"},{"type":"electronic","value":"9783030932060"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-93206-0_20","type":"book-chapter","created":{"date-parts":[[2021,12,16]],"date-time":"2021-12-16T14:04:49Z","timestamp":1639663489000},"page":"327-344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach"],"prefix":"10.1007","author":[{"given":"Joseph K.","family":"Liu","sequence":"first","affiliation":[]},{"given":"Man Ho","family":"Au","sequence":"additional","affiliation":[]},{"given":"Tsz Hon","family":"Yuen","sequence":"additional","affiliation":[]},{"given":"Cong","family":"Zuo","sequence":"additional","affiliation":[]},{"given":"Jiawei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Amin","family":"Sakzad","sequence":"additional","affiliation":[]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,17]]},"reference":[{"key":"20_CR1","unstructured":"Apple Inc and Google Inc., Contact tracing Bluetooth specification v1.1 (2020). https:\/\/www.blog.google\/documents\/58\/Contact_Tracing_-_Bluetooth_Specification_v1.1_RYGZbKW.pdf. Accessed 30 Apr 2020"},{"key":"20_CR2","unstructured":"Apple Inc and Google Inc., Contact tracing cryptography specification (2020). https:\/\/www.blog.google\/documents\/56\/Contact_Tracing_-_Cryptography_Specification.pdf. Accessed 30 Apr 2020"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.jcss.2017.03.002","volume":"90","author":"MH Au","year":"2017","unstructured":"Au, M.H., et al.: A general framework for secure sharing of personal health records in cloud system. J. Comput. Syst. Sci. 90, 46\u201362 (2017)","journal-title":"J. Comput. Syst. Sci."},{"key":"20_CR4","unstructured":"Avitabile, G., Friolo, D., Visconti, I.: TEnK-U: terrorist attacks for fake exposure notifications in contact tracing systems. Cryptology ePrint Archive, Report 2020\/1150 (2020). https:\/\/eprint.iacr.org\/2020\/1150"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1007\/3-540-39200-9_38","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"M Bellare","year":"2003","unstructured":"Bellare, M., Micciancio, D., Warinschi, B.: Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 614\u2013629. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_38"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-24676-3_4","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56\u201373. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_4"},{"key":"20_CR7","unstructured":"Chan, J., et al.: PACT: privacy sensitive protocols and mechanisms for mobile contact tracing (2020)"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1016\/j.future.2017.10.022","volume":"87","author":"Z Chen","year":"2018","unstructured":"Chen, Z., et al.: Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control. Future Gener. Comput. Syst. 87, 712\u2013724 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"20_CR9","unstructured":"Chetty, R., Friedman, J.N., Hendren, N., Stepner, M., et al.: How did COVID-19 and stabilization policies affect spending and employment? A new real-time economic tracker based on private sector data. Technical report, National Bureau of Economic Research (2020)"},{"key":"20_CR10","unstructured":"Danz, N., Derwisch, O., Lehmann, A., Puenter, W., Stolle, M., Ziemann, J.: Security and privacy of decentralized cryptographic contact tracing. Cryptology ePrint Archive, Report 2020\/1309 (2020). https:\/\/eprint.iacr.org\/2020\/1309"},{"key":"20_CR11","unstructured":"Dawsey, J., Dawsey, J., Abutaleb, Y., Stanley-Becker, I., Achenbach, J.: Little evidence that White House has offered contact tracing, guidance to hundreds potentially exposed (2020). https:\/\/www.washingtonpost.com\/health\/white-house-covid-contact-tracing\/2020\/10\/03\/2a6b8e2a-05a1-11eb-897d-3a6201d6643f_story.html. Accessed 5 Oct 2020"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Ferretti, L., et al.: Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing. Science 368(6491) (2020)","DOI":"10.1126\/science.abb6936"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/11761679_27","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C Gentry","year":"2006","unstructured":"Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445\u2013464. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_27"},{"issue":"2","key":"20_CR14","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"20_CR15","unstructured":"Gvili, Y.: Security analysis of the COVID-19 contact tracing specifications by Apple Inc. and Google Inc. Cryptology ePrint Archive, Report 2020\/428 (2020). https:\/\/eprint.iacr.org\/2020\/428"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-319-46298-1_5","volume-title":"Network and System Security","author":"K He","year":"2016","unstructured":"He, K., Weng, J., Liu, J.K., Zhou, W., Liu, J.-N.: Efficient fine-grained access control for secure personal health records in cloud computing. In: Chen, J., Piuri, V., Su, C., Yung, M. (eds.) NSS 2016. LNCS, vol. 9955, pp. 65\u201379. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46298-1_5"},{"issue":"4","key":"20_CR17","doi-asserted-by":"publisher","first-page":"e488","DOI":"10.1016\/S2214-109X(20)30074-7","volume":"8","author":"J Hellewell","year":"2020","unstructured":"Hellewell, J., et al.: Feasibility of controlling COVID-19 outbreaks by isolation of cases and contacts. Lancet Glob. Health 8(4), e488\u2013e496 (2020)","journal-title":"Lancet Glob. Health"},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.future.2014.10.014","volume":"52","author":"J Liu","year":"2015","unstructured":"Liu, J., Huang, X., Liu, J.K.: Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption. Future Gener. Comput. Syst. 52, 67\u201376 (2015)","journal-title":"Future Gener. Comput. Syst."},{"key":"20_CR19","unstructured":"Liu, J.K., et al.: Privacy-preserving COVID-19 contact tracing app: a zero-knowledge proof approach. Cryptology ePrint Archive, Report 2020\/528 (2020). https:\/\/eprint.iacr.org\/2020\/528"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Pietrzak, K.: Delayed authentication: preventing replay and relay attacks in private contact tracing. Cryptology ePrint Archive, Report 2020\/418 (2020). https:\/\/eprint.iacr.org\/2020\/418","DOI":"10.1007\/978-3-030-65277-7_1"},{"key":"20_CR21","unstructured":"Rivest, R., et al.: The pact protocol specification (2020). https:\/\/pact.mit.edu\/wp-content\/uploads\/2020\/04\/The-PACT-protocol-specification-ver-0.1.pdf"},{"issue":"11\u201312","key":"20_CR22","first-page":"w20225","volume":"150","author":"M Salath\u00e9","year":"2020","unstructured":"Salath\u00e9, M., et al.: COVID-19 epidemic in Switzerland: on the importance of testing, contact tracing and isolation. Swiss Med. Weekly 150(11\u201312), w20225 (2020)","journal-title":"Swiss Med. Weekly"},{"key":"20_CR23","unstructured":"Troncoso, C., et al.: Decentralized privacy-preserving proximity tracing (2020). https:\/\/github.com\/DP-3T\/documents\/blob\/master\/DP3T20%White%20Paper.pdf. Accessed 30 Apr 2020"},{"key":"20_CR24","unstructured":"Vaudenay, S.: Analysis of DP3T. Cryptology ePrint Archive, Report 2020\/399 (2020). https:\/\/eprint.iacr.org\/2020\/399"},{"key":"20_CR25","unstructured":"Warren, M., Liptak, K., Shallwani, P.: White House\u2019s inept \u2018contact tracing\u2019 effort leaves the work to others (2020). https:\/\/www.cnn.com\/2020\/10\/04\/politics\/white-house-contact-tracing-covid\/index.html. Accessed 5 Oct 2020"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93206-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T06:04:38Z","timestamp":1643004278000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93206-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030932053","9783030932060"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93206-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 December 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ispec2021.nuist.edu.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"94","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Doble peer review","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}