DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems

This document presents an evolution of the ROBERT protocol that decentralizes most of its operations on the mobile devices. DESIRE is based on the same architecture than ROBERT but implements major privacy improvements. In particular, it introduces the concept of Private Encounter Tokens, that are s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Castelluccia, Claude, Bielova, Nataliia, Boutet, Antoine, Cunche, Mathieu, Lauradoux, Cédric, Métayer, Daniel Le, Roca, Vincent
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Castelluccia, Claude
Bielova, Nataliia
Boutet, Antoine
Cunche, Mathieu
Lauradoux, Cédric
Métayer, Daniel Le
Roca, Vincent
description This document presents an evolution of the ROBERT protocol that decentralizes most of its operations on the mobile devices. DESIRE is based on the same architecture than ROBERT but implements major privacy improvements. In particular, it introduces the concept of Private Encounter Tokens, that are secret and cryptographically generated, to encode encounters. In the DESIRE protocol, the temporary Identifiers that are broadcast on the Bluetooth interfaces are generated by the mobile devices providing more control to the users about which ones to disclose. The role of the server is merely to match PETs generated by diagnosed users with the PETs provided by requesting users. It stores minimal pseudonymous data. Finally, all data that are stored on the server are encrypted using keys that are stored on the mobile devices, protecting against data breach on the server. All these modifications improve the privacy of the scheme against malicious users and authority. However, as in the first version of ROBERT, risk scores and notifications are still managed and controlled by the server of the health authority, which provides high robustness, flexibility, and efficacy.
doi_str_mv 10.48550/arxiv.2008.01621
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2008_01621</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2008_01621</sourcerecordid><originalsourceid>FETCH-LOGICAL-a671-1807f67e94df67d142ef5b35a445fdcc144fc83523fa068fadbc2fd81221b4483</originalsourceid><addsrcrecordid>eNpNkMFKw0AURWfjQqof4Mr3A4kzk0kyuis1aiEo2IDL8DLzph1okzBJSyN-vLa6cHXgwr1wD2M3gsdKpym_w3D0h1hyrmMuMiku2ddjsVq-Fw8wh2rjg4UPnMB1ARCKfeh6whaKY98N-0Dw2o3eeYOj71pYTcNIOyjpQAHXvl3DuCFoaBihc2CoHQNu_SdZwNaCpf_JcO4OV-zC4Xag6z_OWPVUVIuXqHx7Xi7mZYRZLiKhee6ynO6V_YEVSpJLmyRFpVJnjRFKOaOTVCYOeaYd2sZIZ7WQUjRK6WTGbn9nz_frPvgdhqk-aajPGpJvwF5ZVA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems</title><source>arXiv.org</source><creator>Castelluccia, Claude ; Bielova, Nataliia ; Boutet, Antoine ; Cunche, Mathieu ; Lauradoux, Cédric ; Métayer, Daniel Le ; Roca, Vincent</creator><creatorcontrib>Castelluccia, Claude ; Bielova, Nataliia ; Boutet, Antoine ; Cunche, Mathieu ; Lauradoux, Cédric ; Métayer, Daniel Le ; Roca, Vincent</creatorcontrib><description>This document presents an evolution of the ROBERT protocol that decentralizes most of its operations on the mobile devices. DESIRE is based on the same architecture than ROBERT but implements major privacy improvements. In particular, it introduces the concept of Private Encounter Tokens, that are secret and cryptographically generated, to encode encounters. In the DESIRE protocol, the temporary Identifiers that are broadcast on the Bluetooth interfaces are generated by the mobile devices providing more control to the users about which ones to disclose. The role of the server is merely to match PETs generated by diagnosed users with the PETs provided by requesting users. It stores minimal pseudonymous data. Finally, all data that are stored on the server are encrypted using keys that are stored on the mobile devices, protecting against data breach on the server. All these modifications improve the privacy of the scheme against malicious users and authority. However, as in the first version of ROBERT, risk scores and notifications are still managed and controlled by the server of the health authority, which provides high robustness, flexibility, and efficacy.</description><identifier>DOI: 10.48550/arxiv.2008.01621</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2020-08</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,777,882</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2008.01621$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2008.01621$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Castelluccia, Claude</creatorcontrib><creatorcontrib>Bielova, Nataliia</creatorcontrib><creatorcontrib>Boutet, Antoine</creatorcontrib><creatorcontrib>Cunche, Mathieu</creatorcontrib><creatorcontrib>Lauradoux, Cédric</creatorcontrib><creatorcontrib>Métayer, Daniel Le</creatorcontrib><creatorcontrib>Roca, Vincent</creatorcontrib><title>DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems</title><description>This document presents an evolution of the ROBERT protocol that decentralizes most of its operations on the mobile devices. DESIRE is based on the same architecture than ROBERT but implements major privacy improvements. In particular, it introduces the concept of Private Encounter Tokens, that are secret and cryptographically generated, to encode encounters. In the DESIRE protocol, the temporary Identifiers that are broadcast on the Bluetooth interfaces are generated by the mobile devices providing more control to the users about which ones to disclose. The role of the server is merely to match PETs generated by diagnosed users with the PETs provided by requesting users. It stores minimal pseudonymous data. Finally, all data that are stored on the server are encrypted using keys that are stored on the mobile devices, protecting against data breach on the server. All these modifications improve the privacy of the scheme against malicious users and authority. However, as in the first version of ROBERT, risk scores and notifications are still managed and controlled by the server of the health authority, which provides high robustness, flexibility, and efficacy.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNpNkMFKw0AURWfjQqof4Mr3A4kzk0kyuis1aiEo2IDL8DLzph1okzBJSyN-vLa6cHXgwr1wD2M3gsdKpym_w3D0h1hyrmMuMiku2ddjsVq-Fw8wh2rjg4UPnMB1ARCKfeh6whaKY98N-0Dw2o3eeYOj71pYTcNIOyjpQAHXvl3DuCFoaBihc2CoHQNu_SdZwNaCpf_JcO4OV-zC4Xag6z_OWPVUVIuXqHx7Xi7mZYRZLiKhee6ynO6V_YEVSpJLmyRFpVJnjRFKOaOTVCYOeaYd2sZIZ7WQUjRK6WTGbn9nz_frPvgdhqk-aajPGpJvwF5ZVA</recordid><startdate>20200804</startdate><enddate>20200804</enddate><creator>Castelluccia, Claude</creator><creator>Bielova, Nataliia</creator><creator>Boutet, Antoine</creator><creator>Cunche, Mathieu</creator><creator>Lauradoux, Cédric</creator><creator>Métayer, Daniel Le</creator><creator>Roca, Vincent</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20200804</creationdate><title>DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems</title><author>Castelluccia, Claude ; Bielova, Nataliia ; Boutet, Antoine ; Cunche, Mathieu ; Lauradoux, Cédric ; Métayer, Daniel Le ; Roca, Vincent</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a671-1807f67e94df67d142ef5b35a445fdcc144fc83523fa068fadbc2fd81221b4483</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Castelluccia, Claude</creatorcontrib><creatorcontrib>Bielova, Nataliia</creatorcontrib><creatorcontrib>Boutet, Antoine</creatorcontrib><creatorcontrib>Cunche, Mathieu</creatorcontrib><creatorcontrib>Lauradoux, Cédric</creatorcontrib><creatorcontrib>Métayer, Daniel Le</creatorcontrib><creatorcontrib>Roca, Vincent</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Castelluccia, Claude</au><au>Bielova, Nataliia</au><au>Boutet, Antoine</au><au>Cunche, Mathieu</au><au>Lauradoux, Cédric</au><au>Métayer, Daniel Le</au><au>Roca, Vincent</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems</atitle><date>2020-08-04</date><risdate>2020</risdate><abstract>This document presents an evolution of the ROBERT protocol that decentralizes most of its operations on the mobile devices. DESIRE is based on the same architecture than ROBERT but implements major privacy improvements. In particular, it introduces the concept of Private Encounter Tokens, that are secret and cryptographically generated, to encode encounters. In the DESIRE protocol, the temporary Identifiers that are broadcast on the Bluetooth interfaces are generated by the mobile devices providing more control to the users about which ones to disclose. The role of the server is merely to match PETs generated by diagnosed users with the PETs provided by requesting users. It stores minimal pseudonymous data. Finally, all data that are stored on the server are encrypted using keys that are stored on the mobile devices, protecting against data breach on the server. All these modifications improve the privacy of the scheme against malicious users and authority. However, as in the first version of ROBERT, risk scores and notifications are still managed and controlled by the server of the health authority, which provides high robustness, flexibility, and efficacy.</abstract><doi>10.48550/arxiv.2008.01621</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2008.01621
ispartof
issn
language eng
recordid cdi_arxiv_primary_2008_01621
source arXiv.org
subjects Computer Science - Cryptography and Security
title DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T08%3A26%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=DESIRE:%20A%20Third%20Way%20for%20a%20European%20Exposure%20Notification%20System%20Leveraging%20the%20best%20of%20centralized%20and%20decentralized%20systems&rft.au=Castelluccia,%20Claude&rft.date=2020-08-04&rft_id=info:doi/10.48550/arxiv.2008.01621&rft_dat=%3Carxiv_GOX%3E2008_01621%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true