{"id":"https://openalex.org/W3128026932","doi":"https://doi.org/10.1109/ants50601.2020.9342834","title":"Fully Homomorphic Encryption based Privacy-Preserving Data Acquisition and Computation for Contact Tracing","display_name":"Fully Homomorphic Encryption based Privacy-Preserving Data Acquisition and Computation for Contact Tracing","publication_year":2020,"publication_date":"2020-12-14","ids":{"openalex":"https://openalex.org/W3128026932","doi":"https://doi.org/10.1109/ants50601.2020.9342834","mag":"3128026932"},"language":"en","primary_location":{"id":"doi:10.1109/ants50601.2020.9342834","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ants50601.2020.9342834","pdf_url":"https://ieeexplore.ieee.org/ielx7/9342621/9342746/09342834.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/9342621/9342746/09342834.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040131076","display_name":"Koushik Sinha","orcid":"https://orcid.org/0000-0003-3906-2404"},"institutions":[{"id":"https://openalex.org/I110378019","display_name":"Southern Illinois University Carbondale","ror":"https://ror.org/049kefs16","country_code":"US","type":"education","lineage":["https://openalex.org/I110378019","https://openalex.org/I2801502357"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Koushik Sinha","raw_affiliation_strings":["Southern Illinois University,School of Computing,Carbondale,USA","School of Computing, Southern Illinois University, Carbondale, USA"],"affiliations":[{"raw_affiliation_string":"Southern Illinois University,School of Computing,Carbondale,USA","institution_ids":["https://openalex.org/I110378019"]},{"raw_affiliation_string":"School of Computing, Southern Illinois University, Carbondale, USA","institution_ids":["https://openalex.org/I110378019"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087814623","display_name":"Pratham Majumder","orcid":"https://orcid.org/0000-0002-3374-0094"},"institutions":[{"id":"https://openalex.org/I4210104573","display_name":"CMR University","ror":"https://ror.org/015waqy33","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210104573"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pratham Majumder","raw_affiliation_strings":["CMR Institute of Technology,Department of Computer Science and Engineering,Bengaluru,India","CMR Institute of Technology, Bengaluru, India"],"affiliations":[{"raw_affiliation_string":"CMR Institute of Technology,Department of Computer Science and Engineering,Bengaluru,India","institution_ids":["https://openalex.org/I4210104573"]},{"raw_affiliation_string":"CMR Institute of Technology, Bengaluru, India","institution_ids":["https://openalex.org/I4210104573"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054957970","display_name":"Subhas Kumar Ghosh","orcid":"https://orcid.org/0000-0003-1522-7067"},"institutions":[{"id":"https://openalex.org/I3813760","display_name":"Reserve Bank of Australia","ror":"https://ror.org/049cvkb03","country_code":"AU","type":"other","lineage":["https://openalex.org/I3813760"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Subhas K. Ghosh","raw_affiliation_strings":["Commonwealth Bank of Australia,Sydney,New South Eales,Australia,2000","Commonwealth Bank of Australia, Sydney, New South Eales, Australia"],"affiliations":[{"raw_affiliation_string":"Commonwealth Bank of Australia,Sydney,New South Eales,Australia,2000","institution_ids":["https://openalex.org/I3813760"]},{"raw_affiliation_string":"Commonwealth Bank of Australia, Sydney, New South Eales, Australia","institution_ids":["https://openalex.org/I3813760"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040131076"],"corresponding_institution_ids":["https://openalex.org/I110378019"],"apc_list":null,"apc_paid":null,"fwci":1.193,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.84126744,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12943","display_name":"COVID-19 Digital Contact Tracing","score":0.9830999970436096,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8054962158203125},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7836675643920898},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7498916983604431},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7089046239852905},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5063437223434448},{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.49321168661117554},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.46883195638656616},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.4608672559261322},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4512566030025482},{"id":"https://openalex.org/keywords/contact-tracing","display_name":"Contact tracing","score":0.4446549713611603},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.42757272720336914},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42401832342147827},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36770743131637573},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2295905351638794},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.17579147219657898},{"id":"https://openalex.org/keywords/coronavirus-disease-2019","display_name":"Coronavirus disease 2019 (COVID-19)","score":0.06903299689292908}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8054962158203125},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7836675643920898},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7498916983604431},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7089046239852905},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5063437223434448},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.49321168661117554},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.46883195638656616},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.4608672559261322},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4512566030025482},{"id":"https://openalex.org/C113162765","wikidata":"https://www.wikidata.org/wiki/Q1128437","display_name":"Contact tracing","level":5,"score":0.4446549713611603},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.42757272720336914},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42401832342147827},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36770743131637573},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2295905351638794},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.17579147219657898},{"id":"https://openalex.org/C3008058167","wikidata":"https://www.wikidata.org/wiki/Q84263196","display_name":"Coronavirus disease 2019 (COVID-19)","level":4,"score":0.06903299689292908},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C524204448","wikidata":"https://www.wikidata.org/wiki/Q788926","display_name":"Infectious disease (medical specialty)","level":3,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C2779134260","wikidata":"https://www.wikidata.org/wiki/Q12136","display_name":"Disease","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ants50601.2020.9342834","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ants50601.2020.9342834","pdf_url":"https://ieeexplore.ieee.org/ielx7/9342621/9342746/09342834.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1109/ants50601.2020.9342834","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ants50601.2020.9342834","pdf_url":"https://ieeexplore.ieee.org/ielx7/9342621/9342746/09342834.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3128026932.pdf","grobid_xml":"https://content.openalex.org/works/W3128026932.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W2108834246","https://openalex.org/W2402235285","https://openalex.org/W2752065644","https://openalex.org/W2929650703","https://openalex.org/W2948011010","https://openalex.org/W3014084098","https://openalex.org/W3015106467","https://openalex.org/W3016091473","https://openalex.org/W3021029151","https://openalex.org/W3021845694","https://openalex.org/W3021966615","https://openalex.org/W3022622144","https://openalex.org/W3046656966","https://openalex.org/W3048657311","https://openalex.org/W3124349795","https://openalex.org/W4287822196","https://openalex.org/W6775542808","https://openalex.org/W6775777246","https://openalex.org/W6776613861","https://openalex.org/W6776669840"],"related_works":["https://openalex.org/W2312500729","https://openalex.org/W2518050971","https://openalex.org/W2026228941","https://openalex.org/W3106998306","https://openalex.org/W2985442649","https://openalex.org/W1484081998","https://openalex.org/W2902659942","https://openalex.org/W4289129300","https://openalex.org/W2963996977","https://openalex.org/W3012189029"],"abstract_inverted_index":{"For":[0],"public":[1],"health":[2],"surveillance":[3,174],"systems,":[4],"privacy":[5,34],"is":[6,119,167,225],"a":[7,60,75,81,104,125,178,194,246,286,298],"major":[8],"issue":[9],"in":[10,62,74,86,101,170,227,250,273],"storing":[11],"and":[12,20,77,111,182,212,276,280,292],"sharing":[13,64,270],"of":[14,31,65,89,113,124,214,253,271,284,306],"personal":[15,26],"medical":[16,27],"data.":[17,57,116],"Often,":[18],"patients":[19],"organizations":[21],"are":[22],"unwilling":[23],"to":[24,47,51,72,80,153,208,290],"divulge":[25],"data":[28,38,66,143,272,287,296],"for":[29,109,148,165,187,236],"fear":[30,305],"compromising":[32,307],"their":[33],"because":[35],"although":[36],"the":[37,42,56,70,87,90,122,133,141,146,163,204,210,233,251,269,304],"may":[39],"be":[40,48,137],"encrypted,":[41],"encrypted":[43,142,160,262],"values":[44,144],"typically":[45],"need":[46,147,164],"first":[49],"decrypted":[50],"perform":[52],"any":[53,149,171],"computation":[54,112,157],"on":[55,121,140,159,261],"Unfortunately,":[58],"such":[59,285],"barrier":[61],"easy":[63],"can":[67,136,244,300],"severely":[68],"hamper":[69],"ability":[71,152],"respond":[73],"timely":[76],"effective":[78,226],"manner":[79],"crisis":[82],"scenario,":[83],"as":[84,193],"evident":[85],"case":[88,195],"ongoing":[91],"COVID-19":[92,191],"pandemic.":[93],"To":[94],"overcome":[95],"this":[96,102],"critical":[97],"obstacle,":[98],"we":[99],"propose":[100,177],"paper":[103],"novel":[105,179],"privacy-preserving":[106],"encryption":[107,129,206,288],"mechanism":[108],"storage":[110],"sensitive":[114,294,308],"healthcare":[115,295],"Our":[117],"scheme":[118,289],"based":[120],"use":[123,283],"secure":[126],"fully":[127],"homomorphic":[128],"scheme,":[130],"so":[131],"that":[132,221],"required":[134],"computations":[135,259],"performed":[138],"directly":[139,158,260],"without":[145,162],"decryption.":[150],"The":[151,218,282],"execute":[154],"queries":[155,257],"or":[156,258],"data,":[161,263],"decryption,":[166],"not":[168,301],"present":[169],"existing":[172],"public-health":[173],"system.":[175],"We":[176,197],"computational":[180,234],"model":[181],"also":[183,311],"develop":[184],"an":[185],"algorithm":[186,207],"contact":[188],"tracing":[189],"with":[190],"pandemic":[192],"study.":[196],"have":[198,245],"simulated":[199],"our":[200,215,222,240,264],"proposed":[201,216,223],"approach":[202],"using":[203],"ElGamal":[205],"check":[209],"correctness":[211],"effectiveness":[213],"approach.":[217],"results":[219],"show":[220],"solution":[224,266],"providing":[228],"adequate":[229],"security":[230],"while":[231],"supporting":[232],"needs":[235],"contact-tracing.":[237],"Besides":[238],"contact-tracing,":[239],"new":[241],"data-encryption":[242],"technique":[243],"much":[247],"broader":[248],"impact":[249],"field":[252],"healthcare.":[254],"By":[255],"executing":[256],"innovative":[265],"would":[267],"make":[268],"healthcare-related":[274],"research":[275],"industry":[277],"significantly":[278],"simpler":[279],"faster.":[281],"store":[291],"transmit":[293],"over":[297],"network":[299],"only":[302],"allay":[303],"information":[309],"but":[310],"ensure":[312],"HIPAA-compliance.":[313]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
