Segal, AaronFeigenbaum, JoanFord, Bryan Alexander2023-03-272023-03-272023-03-272016-10-2410.1145/2994620.2994628https://infoscience.epfl.ch/handle/20.500.14299/196581How can government agencies acquire actionable, useful information about legitimate targets, while preserving the privacy of innocent parties and holding government agencies accountable? Towards understanding this crucial issue, we present the first privacy-preserving protocol for contact chaining, an operation that law-enforcement and intelligence agencies have used effectively. Our experiments suggest that a three-hop, privacy-preserving graph traversal producing 27,000 ciphertexts can be done in under two minutes.securityprivacycryptographysurveillancelaw enforcementPrivacy-Preserving Lawful Contact Chainingtext::conference output::conference paper not in proceedings