Private discovery of common social contacts

E De Cristofaro, M Manulis, B Poettering - International journal of …, 2013 - Springer
Digital services that are offered, and consumed, on the basis of social relationships form the
backbone of social clouds—an emerging new concept that finds its roots in online social …

PIR-PSI: scaling private contact discovery

D Demmler, P Rindal, M Rosulek… - Proceedings on Privacy …, 2018 - petsymposium.org
An important initialization step in many social-networking applications is contact discovery,
which allows a user of the service to identify which of its existing social contacts also use the …

Scaling mobile private contact discovery to billions of users

L Hetz, T Schneider, C Weinert - European Symposium on Research in …, 2023 - Springer
Mobile contact discovery is a convenience feature of messengers such as WhatsApp or
Telegram that helps users to identify which of their existing contacts are registered with the …

Mobile private contact discovery at scale

D Kales, C Rechberger, T Schneider… - 28th USENIX Security …, 2019 - usenix.org
Mobile messengers like WhatsApp perform contact discovery by uploading the user's entire
address book to the service provider. This allows the service provider to determine which of …

Arke: Scalable and Byzantine fault tolerant privacy-preserving contact discovery

N Mohnblatt, A Sonnino, K Gurkan… - Cryptology ePrint …, 2023 - eprint.iacr.org
Contact discovery is a crucial component of social applications, facilitating interactions
between registered contacts. This work introduces Arke, a novel approach to contact …

Provably secure contact tracing with conditional private set intersection

J Takeshita, R Karl, A Mohammed, A Striegel… - Security and Privacy in …, 2021 - Springer
The novel coronavirus COVID-19 spreads easily through personal contact, requiring the use
of contact tracing to track the spread of the disease. Many existing approaches either trust a …

Privacy-preserving relationship path discovery in social networks

G Mezzour, A Perrig, V Gligor… - Cryptology and Network …, 2009 - Springer
As social networks sites continue to proliferate and are being used for an increasing variety
of purposes, the privacy risks raised by the full access of social networking sites over user …

Delayed authentication: Preventing replay and relay attacks in private contact tracing

K Pietrzak - Progress in Cryptology–INDOCRYPT 2020: 21st …, 2020 - Springer
Currently several projects aim at designing and implementing protocols for privacy
preserving automated contact tracing to help fight the current pandemic. Those proposal are …

Privacy guidelines for contact tracing applications

M Shukla, S Lodha, G Shroff, R Raskar - arXiv preprint arXiv …, 2020 - arxiv.org
Contact tracing is a very powerful method to implement and enforce social distancing to
avoid spreading of infectious diseases. The traditional approach of contact tracing is time …

A protocol for anonymous short communications in social networks and its application to proximity-based services

F Buccafurri, V De Angelis, MF Idone… - Online Social Networks …, 2022 - Elsevier
Several innovative applications could be advantageously placed within social networks, to
be effective, attractive, and pervasive. Examples of application domains that could benefit …