Artificial intelligence and internet of things (AI-IoT) technologies in response to COVID-19 pandemic: A systematic review

JI Khan, J Khan, F Ali, F Ullah, J Bacha, S Lee - Ieee Access, 2022 - ieeexplore.ieee.org
The origin of the COVID-19 pandemic has given overture to redirection, as well as
innovation to many digital technologies. Even after the progression of vaccination efforts …

Spiral: Fast, high-rate single-server PIR via FHE composition

SJ Menon, DJ Wu - 2022 IEEE symposium on security and …, 2022 - ieeexplore.ieee.org
We introduce the SPIRAL family of single-server private information retrieval (PIR) protocols.
SPIRAL relies on a composition of two lattice-based homomorphic encryption schemes: the …

A survey of COVID-19 contact tracing apps

N Ahmed, RA Michelin, W Xue, S Ruj, R Malaney… - IEEE …, 2020 - ieeexplore.ieee.org
The recent outbreak of COVID-19 has taken the world by surprise, forcing lockdowns and
straining public health care systems. COVID-19 is known to be a highly infectious virus, and …

Labeled PSI from homomorphic encryption with reduced computation and communication

K Cong, RC Moreno, MB da Gama, W Dai… - Proceedings of the …, 2021 - dl.acm.org
It is known that fully homomorphic encryption (FHE) can be used to build efficient (labeled)
Private Set Intersection protocols in the unbalanced setting, where one of the sets is much …

[HTML][HTML] Non-pharmaceutical interventions against COVID-19 pandemic: Review of contact tracing and social distancing technologies, protocols, apps, security and …

UR Alo, FO Nkwo, HF Nweke, II Achi, HA Okemiri - Sensors, 2021 - mdpi.com
The COVID-19 Pandemic has punched a devastating blow on the majority of the world's
population. Millions of people have been infected while hundreds of thousands have died of …

Centralized or decentralized? The contact tracing dilemma

S Vaudenay - 2020 - infoscience.epfl.ch
The COVID-19 pandemic created a noticeable challenge to the cryptographic community
with the development of contact tracing applications. The media reported a dispute between …

Simple, fast malicious multiparty private set intersection

O Nevo, N Trieu, A Yanai - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
We address the problem of multiparty private set intersection against a malicious adversary.
First, we show that when one can assume no collusion amongst corrupted parties then there …

Function secret sharing for mixed-mode and fixed-point secure computation

E Boyle, N Chandran, N Gilboa, D Gupta… - … Conference on the …, 2021 - Springer
Abstract Boyle et al.(TCC 2019) proposed a new approach for secure computation in the
preprocessing model building on function secret sharing (FSS), where a gate g is evaluated …

Catalic: Delegated PSI cardinality with applications to contact tracing

T Duong, DH Phan, N Trieu - International Conference on the Theory and …, 2020 - Springer
Abstract Private Set Intersection Cardinality (PSI-CA) allows two parties, each holding a set
of items, to learn the size of the intersection of those sets without revealing any additional …

Efficient unbalanced private set intersection cardinality and user-friendly privacy-preserving contact tracing

M Wu, TH Yuen - 32nd USENIX Security Symposium (USENIX Security …, 2023 - usenix.org
An unbalanced private set intersection cardinality (PSI-CA) protocol is a protocol to securely
get the intersection cardinality of two sets X and Y without disclosing anything else, in which …