{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:25Z","timestamp":1740149065642,"version":"3.37.3"},"reference-count":40,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T00:00:00Z","timestamp":1622160000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"],"award-info":[{"award-number":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Program of China","award":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"],"award-info":[{"award-number":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"],"award-info":[{"award-number":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Plan of Shaanxi Province","award":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"],"award-info":[{"award-number":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"]}]},{"name":"S&T Program of Hebei","award":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"],"award-info":[{"award-number":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"]}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"crossref","award":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"],"award-info":[{"award-number":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"crossref"}]},{"name":"CCF-Huawei Database System Innovation Research Plan","award":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"],"award-info":[{"award-number":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"]}]},{"name":"Fujian Science and Technology Association","award":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"],"award-info":[{"award-number":["61972094","61902299","61976168","62032005","2018YFC0831200","2018M633473","2019TQ0239","2019M663636","2019ZDLGY13-09","20310102D","2019CGXNG-023","CCF-HuaweiDBIR008\u2009B"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,5,28]]},"abstract":"<jats:p>Contact tracing is a critical tool in containing epidemics such as COVID-19. Researchers have carried out a lot of work on contact tracing. However, almost all of the existing works assume that their clients and authorities have large storage space and powerful computation capability and clients can implement contact tracing on their own mobile devices such as mobile phones, tablet computers, and wearable computers. With the widespread outbreaks of the epidemics, these approaches are of less robustness to a larger scale of datasets when it comes to resource-constrained clients. To address this limitation, we propose a publicly verifiable contact tracing algorithm in cloud computing (PvCT), which utilizes cloud services to provide storage and computation capability in contact tracing. To guarantee the integrity and accuracy of contact tracing results, PvCT applies a novel set accumulator-based authentication data structure whose computation is outsourced, and the client can check whether returned results are valid. Furthermore, we provide rigorous security proof of our algorithm based on the <jats:inline-formula>\n                     <a:math xmlns:a=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\">\n                        <a:mi>q<\/a:mi>\n                     <\/a:math>\n                  <\/jats:inline-formula>-Strong Bilinear Diffie\u2013Hellman assumption. Detailed experimental evaluation is also conducted on three real-world datasets. The results show that our algorithm is feasible within milliseconds of client CPU time and can significantly reduce the storage overhead from the size of datasets to a constant 128 bytes.<\/jats:p>","DOI":"10.1155\/2021\/5514137","type":"journal-article","created":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T22:54:28Z","timestamp":1622674468000},"page":"1-18","source":"Crossref","is-referenced-by-count":2,"title":["PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6556-104X","authenticated-orcid":true,"given":"Yixiao","family":"Zhu","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9647-3931","authenticated-orcid":true,"given":"Wenjie","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5569-0780","authenticated-orcid":true,"given":"Jiangtao","family":"Cui","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710071, China"},{"name":"Qingdao Institute of Computing Technology, Xidian University, Qingdao 266109, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2953-2313","authenticated-orcid":true,"given":"Xiaofang","family":"Xia","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3210-0714","authenticated-orcid":true,"given":"Yanguo","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710071, China"},{"name":"Qingdao Institute of Computing Technology, Xidian University, Qingdao 266109, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7165-398X","authenticated-orcid":true,"given":"Jianting","family":"Ning","sequence":"additional","affiliation":[{"name":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou 350007, China"},{"name":"The State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"}]}],"member":"311","reference":[{"volume-title":"Implementation and Management of Contact Tracing For Ebola Virus Disease","year":"2015","author":"WHO","key":"1"},{"article-title":"Coronavirus contact tracing: world split between two types of app","year":"2020","author":"C. Criddle","key":"2"},{"article-title":"Apps gone rogue: maintaining personal privacy in an epidemic","year":"2020","author":"R. Raskar","key":"3"},{"article-title":"Epione: lightweight contact tracing with strong privacy","year":"2020","author":"N. Trieu","key":"4"},{"article-title":"Contact tracing mobile apps for covid-19: privacy considerations and related trade-offs","year":"2020","author":"H. Cho","key":"5"},{"key":"6","unstructured":"BayJ.KekJ.TanA.A privacy-preserving protocol for community-driven contact tracing across borders2020SingaporeGovernment Technology AgencyTechnical Report"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3025953"},{"article-title":"Private-yet-verifiable contact tracing","year":"2020","author":"A. Canidio","key":"8"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866751"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26954-8_24"},{"first-page":"238","article-title":"Pinocchio: nearly practical verifiable computation","author":"B. Parno","key":"12"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39658-1_2"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2578855.2535851"},{"first-page":"147","article-title":"When query authentication meets fine-grained access control: a zero-knowledge approach","author":"C. Xu","key":"15"},{"first-page":"167","article-title":"Authenticated online data integration services","author":"Q. Chen","key":"16"},{"first-page":"560","article-title":"Authenticating query results in edge computing","author":"H. Pang","key":"17"},{"article-title":"Privacy preserving contact tracing","year":"2020","author":"Apple","key":"18"},{"article-title":"Exposure notification api","year":"2020","author":"Google","key":"19"},{"article-title":"Pact: privacy sensitive protocols and mechanisms for mobile contact tracing","year":"2020","author":"J. Chan","key":"20"},{"first-page":"121","article-title":"Dynamic authenticated index structures for outsourced databases","author":"F. Li","key":"21"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-008-0113-2"},{"first-page":"863","article-title":"vsql: verifying arbitrary sql queries over dynamic outsourced databases","author":"Y. Zhang","key":"23"},{"first-page":"781","article-title":"Succinct non-interactive zero knowledge for a von neumann architecture","author":"E. Ben-Sasson","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-016-0221-0"},{"first-page":"2111","article-title":"Sonic: zero-knowledge snarks from linear-size universal and updatable structured reference strings","author":"M. Maller","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26954-8_23"},{"first-page":"218","article-title":"A certified digital signature","author":"R. C. Merkle","key":"29"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2011.04.021"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_6"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1977-0436662-8"},{"first-page":"158","article-title":"An expressive (zero-knowledge) set accumulator","author":"Y. Zhang","key":"34"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_7"},{"key":"36","article-title":"A lightweight and forward-secure range query on geographically encrypted data","volume":"17","author":"Y. Peng","year":"2020","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"first-page":"363","article-title":"Time-aware point-of-interest recommendation","author":"Q. Yuan","key":"37"},{"first-page":"253","article-title":"Geppetto: versatile verifiable computation","author":"C. Costello","key":"38"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53015-3_18"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/322123.322138"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5514137.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5514137.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5514137.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T22:54:40Z","timestamp":1622674480000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/5514137\/"}},"subtitle":[],"editor":[{"given":"M.A.","family":"Jabbar","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,5,28]]},"references-count":40,"alternative-id":["5514137","5514137"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5514137","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,5,28]]}}}