id author title date pages extension mime words sentences flesch summary cache txt cord-128041-vmmme94y Shen, Meng Bluetooth-based COVID-19 Proximity Tracing Proposals: An Overview 2020-08-28 .txt text/plain 5813 345 55 Then, we summarized eight security and privacy design goals for Bluetooth-based COVID-19 proximity tracing proposals and applied them to analyze the five proposals. In the centralized proximity tracing proposals, users broadcast and receive encounter information (anonymous ID, transmission time, etc.) via Bluetooth. In the decentralized proximity tracing proposals, when users are infected with COVID-19, the keys related to the generation of anonymous IDs is uploaded to the server. The two decentralized proposals have roughly similar processes, and the specific difference is reflected in the different algorithms for generating anonymous IDs. In the low-cost design, the seed keys of one user are linkable. But attackers cannot obtain valid information by analyzing these messages due to using the generation algorithm of anonymous IDs. In decentralized proposals, only users who may be at risk of infection can do risk calculation. In the centralized proposals, the server handles user pseudonyms, anonymous IDs generated based on the user pseudonyms and encounter information uploaded. ./cache/cord-128041-vmmme94y.txt ./txt/cord-128041-vmmme94y.txt