MLCT: A multi-level contact tracing scheme with strong privacy

Peng Chen, Jixin Zhang, Jiageng Chen, Weizhi Meng

Research output: Contribution to journalJournal articleResearchpeer-review

Abstract

With the outbreak of Covid-19, both people's health and the world economy are facing great challenges. Contact tracing scheme based on Bluetooth of smartphones has been regarded as a viable way to mitigate the spread of Covid-19. The existing schemes mainly belong to the centralized or the decentralized structure, both of which have their own limitations. It is infeasible for the existing schemes to balance the different demands of governments and users for user privacy and tracing efficiency at different periods of the epidemic. In this paper, we propose a hybrid contact tracing scheme named MLCT (multi-level contact tracing scheme) which is mainly based on short group signature. MLCT provides multiple privacy levels by applying anonymous credential technology and secret sharing technology to desensitize user identity privacy and encounter privacy. Comparing to the previous schemes, MLCT fully considers the different demands of the government, patients, and close contacts for user privacy and tracing efficiency in the different stages of Covid-19. The experimental results show viability in terms of the required resource from both server and mobile phone perspectives. And the security analysis demonstrates that MLCT can achieve the five targets security goals. It is expected that MLCT can contribute to the design and development of contact tracing schemes.
Original languageEnglish
Article numbere6929
JournalConcurrency and Computation: Practice & Experience
Volume35
Issue number19
Number of pages17
ISSN1532-0626
DOIs
Publication statusPublished - 2023

Bibliographical note

Special Issue: S2World 2020. CANDAR 2021

Keywords

  • Anonymous credential
  • Bluetooth
  • Covid-19
  • Contact tracing
  • Group signature
  • Secret sharing

Fingerprint

Dive into the research topics of 'MLCT: A multi-level contact tracing scheme with strong privacy'. Together they form a unique fingerprint.

Cite this