Decentralized Privacy-Preserving Proximity Tracing
This system, referred to as DP3T, provides a technological foundation to help slow the spread of SARS-CoV-2 by simplifying and accelerating the process of notifying people who might have been exposed to the virus so that they can take appropriate measures to break its transmission chain.
Protecting location privacy: optimal strategy against localization attacks
- R. Shokri, George Theodorakopoulos, C. Troncoso, J. Hubaux, J. Boudec
- Computer ScienceConference on Computer and Communications…
- 16 October 2012
This work proposes the first methodology, to the best of the knowledge, that enables a designer to find the optimal LPPM for a LBS given each user's service quality constraints against an adversary implementing the optimal inference algorithm and develops two linear programs that output the best LPPM strategy and its corresponding optimal inference attack.
Engineering Privacy by Design
This paper argues that engineering systems according to the privacy by design principles requires the development of generalizable methodologies that build upon the principle of data minimization, and presents a summary of two case studies in which privacy is achieved by minimizing different types of data.
PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
- C. Troncoso, G. Danezis, E. Kosta, J. Balasch, B. Preneel
- Computer ScienceIEEE Transactions on Dependable and Secure…
- 29 October 2007
This work presents PriPAYD, a system where the premium calculations are performed locally in the vehicle, and only aggregated data are sent to the insurance company, without leaking location information.
PrETP: Privacy-Preserving Electronic Toll Pricing
- J. Balasch, Alfredo Rial, C. Troncoso, B. Preneel, I. Verbauwhede, C. Geuens
- Computer ScienceUSENIX Security Symposium
- 11 August 2010
This work presents PrETP, a privacy-preserving ETP system in which on-board units can prove that they use genuine data and perform correct operations while disclosing the minimum amount of location data.
OB-PWS: Obfuscation-Based Private Web Search
- Ero Balsa, C. Troncoso, Claudia Díaz
- Computer ScienceIEEE Symposium on Security and Privacy
- 20 May 2012
An abstract model and an associated analysis framework are proposed to systematically evaluate the privacy protection offered by OB-PWS systems and elicit a set of features that must be taken into account when analyzing the security of OB- PWS designs to avoid falling into the same pitfalls as previous proposals.
Knock Knock, Who's There? Membership Inference on Aggregate Location Data
- Apostolos Pyrgelis, C. Troncoso, Emiliano De Cristofaro
- Computer ScienceNetwork and Distributed System Security Symposium
- 21 August 2017
It is found that membership inference is a serious privacy threat, and how its effectiveness depends on the adversary's prior knowledge, the characteristics of the underlying location data, as well as the number of users and the timeframe on which aggregation is performed is shown.
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments
- C. Troncoso, Marios Isaakidis, G. Danezis, H. Halpin
- Computer ScienceProceedings on Privacy Enhancing Technologies
- 26 April 2017
It is argued that a combination of insights from cryptography, distributed systems, and mechanism design, aligned with the development of adequate incentives, are necessary to build scalable and successful privacy-preserving decentralized systems.
Early Evidence of Effectiveness of Digital Contact Tracing for SARS-CoV-2 in Switzerland
It is demonstrated proof-of-principle that digital contact tracing reaches exposed contacts, who then test positive for SARS-CoV-2, indicating thatdigital contact tracing is an effective complementary tool for controlling the spread of Sars-Cov-2.
Drac: An Architecture for Anonymous Low-Volume Communications
- G. Danezis, Claudia Díaz, C. Troncoso, B. Laurie
- Computer ScienceInternational Symposium on Privacy Enhancing…
- 21 July 2010
Drac is a system designed to provide anonymity and unobservability for real-time instant messaging and voice-over-IP communications against a global passive adversary using a relay based anonymization mechanism.