{"id":"https://openalex.org/W4400381941","doi":"https://doi.org/10.56553/popets-2024-0134","title":"Deniability in Automated Contact Tracing: Impossibilities and Possibilities","display_name":"Deniability in Automated Contact Tracing: Impossibilities and Possibilities","publication_year":2024,"publication_date":"2024-07-06","ids":{"openalex":"https://openalex.org/W4400381941","doi":"https://doi.org/10.56553/popets-2024-0134"},"language":"en","primary_location":{"id":"doi:10.56553/popets-2024-0134","is_oa":true,"landing_page_url":"http://dx.doi.org/10.56553/popets-2024-0134","pdf_url":"https://petsymposium.org/popets/2024/popets-2024-0134.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://petsymposium.org/popets/2024/popets-2024-0134.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048342354","display_name":"Christoph U. G\u00fcnther","orcid":"https://orcid.org/0009-0001-5790-695X"},"institutions":[{"id":"https://openalex.org/I157556583","display_name":"Institute of Science and Technology Austria","ror":"https://ror.org/03gnh5541","country_code":"AT","type":"education","lineage":["https://openalex.org/I157556583"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Christoph U. G\u00fcnther","raw_affiliation_strings":["Institute of Science and Technology Austria"],"affiliations":[{"raw_affiliation_string":"Institute of Science and Technology Austria","institution_ids":["https://openalex.org/I157556583"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103200276","display_name":"Krzysztof Pietrzak","orcid":"https://orcid.org/0000-0002-9139-1654"},"institutions":[{"id":"https://openalex.org/I157556583","display_name":"Institute of Science and Technology Austria","ror":"https://ror.org/03gnh5541","country_code":"AT","type":"education","lineage":["https://openalex.org/I157556583"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Krzysztof Pietrzak","raw_affiliation_strings":["Institute of Science and Technology Austria"],"affiliations":[{"raw_affiliation_string":"Institute of Science and Technology Austria","institution_ids":["https://openalex.org/I157556583"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048342354"],"corresponding_institution_ids":["https://openalex.org/I157556583"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14113142,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2024","issue":"4","first_page":"636","last_page":"648"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12943","display_name":"COVID-19 Digital Contact Tracing","score":0.892300009727478,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12943","display_name":"COVID-19 Digital Contact Tracing","score":0.892300009727478,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/contact-tracing","display_name":"Contact tracing","score":0.7212752103805542},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.6672435998916626},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5452343821525574},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.36742034554481506},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.32693547010421753},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3212066888809204},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.20215216279029846},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.16965225338935852}],"concepts":[{"id":"https://openalex.org/C113162765","wikidata":"https://www.wikidata.org/wiki/Q1128437","display_name":"Contact tracing","level":5,"score":0.7212752103805542},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.6672435998916626},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5452343821525574},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.36742034554481506},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.32693547010421753},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3212066888809204},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.20215216279029846},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.16965225338935852},{"id":"https://openalex.org/C2779134260","wikidata":"https://www.wikidata.org/wiki/Q12136","display_name":"Disease","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C3008058167","wikidata":"https://www.wikidata.org/wiki/Q84263196","display_name":"Coronavirus disease 2019 (COVID-19)","level":4,"score":0.0},{"id":"https://openalex.org/C524204448","wikidata":"https://www.wikidata.org/wiki/Q788926","display_name":"Infectious disease (medical specialty)","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.56553/popets-2024-0134","is_oa":true,"landing_page_url":"http://dx.doi.org/10.56553/popets-2024-0134","pdf_url":"https://petsymposium.org/popets/2024/popets-2024-0134.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.56553/popets-2024-0134","is_oa":true,"landing_page_url":"http://dx.doi.org/10.56553/popets-2024-0134","pdf_url":"https://petsymposium.org/popets/2024/popets-2024-0134.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7300000190734863,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1906090066","display_name":null,"funder_award_id":"10.55776/F85","funder_id":"https://openalex.org/F4320321181","funder_display_name":"Austrian Science Fund"}],"funders":[{"id":"https://openalex.org/F4320321181","display_name":"Austrian Science Fund","ror":"https://ror.org/013tf3c58"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4400381941.pdf","grobid_xml":"https://content.openalex.org/works/W4400381941.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4213139346","https://openalex.org/W3204036590","https://openalex.org/W1989717680","https://openalex.org/W4225962435","https://openalex.org/W3158100496","https://openalex.org/W3130225502","https://openalex.org/W2170160357","https://openalex.org/W4399915950","https://openalex.org/W2012140923","https://openalex.org/W4287554683"],"abstract_inverted_index":{"Automated":[0],"contact":[1],"tracing":[2],"(ACT)":[3],"emerged":[4],"as":[5,159,200],"a":[6,29,78,126,201],"promising":[7],"measure":[8],"to":[9,21,40,53,207],"curb":[10],"the":[11,34,88,135,173,179,184],"spread":[12],"of":[13,130,187],"Covid-19.":[14],"Users":[15],"enable":[16],"ACT":[17,46,64,192],"on":[18],"their":[19,38,42],"smartphones":[20,158],"automatically":[22],"record":[23],"contacts":[24],"with":[25,142],"other":[26],"users.":[27],"If":[28],"user":[30,79,89],"tests":[31],"positive":[32],"for":[33],"disease,":[35],"they":[36,51,98],"report":[37],"diagnosis":[39],"alert":[41],"contacts.":[43],"Designing":[44],"effective":[45],"protocols":[47,65,162],"is":[48,74],"challenging":[49],"since":[50,120],"need":[52],"be":[54,146,198],"efficient":[55,166],"and":[56,132,149,167,190],"secure":[57],"while":[58],"also":[59,197],"ensuring":[60],"users'":[61],"privacy.":[62],"As":[63],"necessarily":[66],"leak":[67],"some":[68,108],"information":[69],"by":[70],"design,":[71],"defining":[72],"privacy":[73,103],"difficult.":[75],"For":[76],"example,":[77],"cannot":[80,145],"deny":[81,92],"having":[82],"met":[83],"another":[84],"user.":[85],"Ideally,":[86],"however,":[87],"can":[90,196],"plausibly":[91],"everything":[93],"else,":[94],"in":[95,211],"particular,":[96],"when":[97],"met.":[99],"We":[100,122],"call":[101],"this":[102],"property":[104],"contact-time":[105,112,147,209],"deniability.":[106],"While":[107],"early":[109],"works":[110],"discussed":[111],"deniability":[113,124,210],"informally,":[114],"it":[115,195],"has":[116],"received":[117],"little":[118],"attention":[119],"then.":[121],"investigate":[123],"from":[125],"rigorous,":[127],"theoretical":[128],"point":[129],"view":[131],"arrive":[133],"at":[134],"following":[136],"impossibility":[137,180],"result:":[138],"A":[139],"decentralized":[140],"protocol":[141],"unidirectional":[143],"communication":[144],"deniable":[148],"replay-secure.":[150],"This":[151],"holds":[152],"even":[153],"if":[154],"malicious":[155],"users":[156],"treat":[157],"black-boxes.":[160],"Unidirectional":[161],"are":[163,170],"usually":[164],"very":[165],"many":[168],"proposals":[169],"unidirectional,":[171],"e.g.,":[172],"widely-deployed":[174],"Google-Apple":[175],"Exposure":[176],"Notifications.":[177],"So":[178],"result":[181],"considerably":[182],"constrains":[183],"design":[185],"space":[186],"efficient,":[188],"secure,":[189],"private":[191],"protocols.":[193],"However,":[194],"used":[199],"guide;":[202],"we":[203],"discuss":[204],"several":[205],"possibilities":[206],"achieve":[208],"practice.":[212]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
