Szczegóły

Tytuł artykułu

Extensions for Apple-Google exposure notification mechanism

Tytuł czasopisma

Bulletin of the Polish Academy of Sciences Technical Sciences

Rocznik

2021

Wolumin

69

Numer

4

Autorzy

Afiliacje

Bobowski, Adam : Wrocław University of Science and Technology, Wybrzeże Stanisława Wyspiańskiego 27, 50-370 Wrocław, Poland ; Cichoń, Jacek : Wrocław University of Science and Technology, Wybrzeże Stanisława Wyspiańskiego 27, 50-370 Wrocław, Poland ; Kutyłowski, Mirosław : Wrocław University of Science and Technology, Wybrzeże Stanisława Wyspiańskiego 27, 50-370 Wrocław, Poland

Słowa kluczowe

contact tracing ; exposure notification ; privacy ; verifiability ; temporary exposure key ; rolling proximity identifier ; diagnosis key ; data sketch ; Jaccard similarity

Wydział PAN

Nauki Techniczne

Zakres

e137126

Bibliografia

  1. Ministry of Health and Government Technology Agency (GovTech), Trace Together Programme, [Online]. Available: https://www. tracetogether.gov.sg.
  2. The European Parliament and the Council of the European Union: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/ec (General Data Protection Regulation). Official Journal of the European Union, L119.1, 4.5.2016.
  3. Corona-Warn-App Consortium, [Online]. Available: https://www.coronawarn.app/en/.
  4. C. Troncoso et. al, “Decentralized Privacy-Preserving Proximity Tracing,” [Online]. Available: https://github.com/DP-3T/documents/ blob/master/DP3T%20White%20Paper.pdf.
  5. Apple & Google, “Exposure Notification Cryptography Specification,” [Online]. Available: https://covid19-static.cdn-apple.com/ applications/covid19/current/static/contact-tracing/pdf/ExposureNotification-CryptographySpecificationv1.2.pdf?1.
  6. D. Shumow and N. Ferguson, “On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng,” [Online]. Available: http:// rump2007.cr.yp.to/15-shumow.pdf.
  7. V. Goyal, A. O’Neill, and V. Rao, “Correlated-input secure hash functions,” Theory of Cryptography Conference (TCC), 2011, pp. 182‒200.
  8. A.Z. Broder, “On the resemblance and containment of documents,” Proceedings. Compression and Complexity of SEQUENCES 1997, Italy, 1997, pp. 21‒29.

Data

24.04.2021

Typ

Article

Identyfikator

DOI: 10.24425/bpasts.2021.137126 ; ISSN 2300-1917

Źródło

Bulletin of the Polish Academy of Sciences: Technical Sciences; Early Access; e137126
×