{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T20:05:04Z","timestamp":1767902704812,"version":"3.49.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,14]]},"DOI":"10.1109\/ants50601.2020.9342834","type":"proceedings-article","created":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T10:28:30Z","timestamp":1612866510000},"page":"1-6","source":"Crossref","is-referenced-by-count":16,"title":["Fully Homomorphic Encryption based Privacy-Preserving Data Acquisition and Computation for Contact Tracing"],"prefix":"10.1109","author":[{"given":"Koushik","family":"Sinha","sequence":"first","affiliation":[{"name":"Southern Illinois University,School of Computing,Carbondale,USA"}]},{"given":"Pratham","family":"Majumder","sequence":"additional","affiliation":[{"name":"CMR Institute of Technology,Department of Computer Science and Engineering,Bengaluru,India"}]},{"given":"Subhas K.","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Commonwealth Bank of Australia,Sydney,New South Eales,Australia,2000"}]}],"member":"263","reference":[{"key":"ref33","year":"0","journal-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref31","year":"0"},{"key":"ref30","year":"0","journal-title":"Microsoft SEAL"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00028"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"ref34","year":"2020","journal-title":"SIU researcher&#x2019;s tool would improve tracking avoidance of COVID-19 cases"},{"key":"ref10","article-title":"PACT: Privacy-Sensitive Protocols and Mechanisms for Mobile Contact Tracing","volume":"abs 2004 3544","author":"chan","year":"2020","journal-title":"ArXiv"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1126\/science.abc0473"},{"key":"ref12","author":"bay","year":"0","journal-title":"Bluetrace A Privacy-Preserving Protocol for Community-Driven Contact Tracing Across Borders"},{"key":"ref13","article-title":"Introduction to Public Health","year":"2014","journal-title":"Public Health 101 Series U S Department of Health and Human Services"},{"key":"ref14","year":"0","journal-title":"Integrated Surveillance Information Systems\/NEDSS CDC"},{"key":"ref15","year":"0","journal-title":"Illinois&#x2019; National Electronic Disease Surveillance System (I-NEDSS)"},{"key":"ref16","year":"0","journal-title":"National notifiable diseases surveillanc system"},{"key":"ref17","year":"0","journal-title":"Governments Shouldn&#x2019;t Use &#x2018;Centralized&#x2019; Proximity Tracking Technology"},{"key":"ref18","article-title":"Demonstrating 15 contact tracing and other tools built to mitigate the impact of COVID-19","year":"0"},{"key":"ref19","article-title":"COVID-19 Contact-tracing Apps: a Survey on the Global Deployment and Challenges","volume":"abs 2005 3599","author":"li","year":"0","journal-title":"ArXiv"},{"key":"ref4","year":"0","journal-title":"Pan-European Privacy-Preserving Proximity Tracing (PEPP-PT\/PEPP)"},{"key":"ref28","author":"altmann","year":"2020","journal-title":"Acceptability of app-based contact tracing for COVID-19 Cross-country survey evidence"},{"key":"ref3","year":"0","journal-title":"COVID-19 apps"},{"key":"ref27","article-title":"Assessing Disease Exposure Risk with Location Data: A Proposal for Cryptographic Preservation of Privacy","author":"berke","year":"2020","journal-title":"arXiv Cryptography and Security"},{"key":"ref6","author":"arx","year":"0","journal-title":"Slowing the Spread of Infectious Diseases Using Crowdsourced Data"},{"key":"ref29","year":"0","journal-title":"PALISADE Homomorphic Encryption Software Library"},{"key":"ref5","year":"0","journal-title":"Temporary Contact Numbers (TCN) Protocol"},{"key":"ref8","article-title":"Exposure Notifications: Using technology to help public health authorities fight COVID-19","year":"0"},{"key":"ref7","author":"troncoso","year":"0","journal-title":"Decentralized Privacy-Preserving Proximity Tracing (DP-3T)"},{"key":"ref2","year":"0"},{"key":"ref1","year":"0","journal-title":"Healthy Together"},{"key":"ref9","author":"rivest","year":"0","journal-title":"PACT Private Automated Contact Tracing"},{"key":"ref20","article-title":"Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs","volume":"abs 2003 11511","author":"cho","year":"2020","journal-title":"ArXiv"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1126\/science.abb9045"},{"key":"ref21","article-title":"COVID-19 Contact Tracing: Why Apple and Google Can&#x2019;t Make This Work","author":"doffman","year":"0","journal-title":"Forbes"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1186\/s40504-017-0062-x"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3201\/eid2507.181421"},{"key":"ref26","article-title":"A Coronavirus Contact Tracing App Replay Attack with Estimated Amplification Factors","author":"farell","year":"2020","journal-title":"School of Computer Science & Statistics (SCSS) Technical Report"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1136\/medethics-2020-106314"}],"event":{"name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","location":"New Delhi, India","start":{"date-parts":[[2020,12,14]]},"end":{"date-parts":[[2020,12,17]]}},"container-title":["2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9342621\/9342746\/09342834.pdf?arnumber=9342834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:09:40Z","timestamp":1756235380000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9342834\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,14]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/ants50601.2020.9342834","relation":{},"subject":[],"published":{"date-parts":[[2020,12,14]]}}}