Proceedings of the Australasian Computer Science Week Multiconference 2017
DOI: 10.1145/3014812.3014885
|View full text |Cite
|
Sign up to set email alerts
|

An efficient and provably secure RFID grouping proof protocol

Abstract: RFID Grouping proof convinces an offline verifier that multiple tags are simultaneously scanned. Various solutions have been proposed but most of them have security and privacy vulnerabilities. In this paper, we propose an elliptic-curve-based RFID grouping proof protocol. Our protocol is proven secure and narrowstrong private. We also demonstrate that our grouping proof can be batch verified to improve the efficiency for large-scale RFID systems and it is suitable for low-cost RFID tags. In this paper, we pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 22 publications
(28 reference statements)
0
1
0
Order By: Relevance
“…Therefore, another technique route is to design the yoking‐proof schemes based on the public‐key cryptographic primitives. Some public‐key based yoking‐proof schemes were presented to address similar security and privacy problems as the symmetric‐key based yoking‐proof schemes. From the efficiency concern, it is clear that the symmetric‐key based yoking‐proof schemes are more suitable for the RFID applications than the public‐key based yoking‐proof schemes.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, another technique route is to design the yoking‐proof schemes based on the public‐key cryptographic primitives. Some public‐key based yoking‐proof schemes were presented to address similar security and privacy problems as the symmetric‐key based yoking‐proof schemes. From the efficiency concern, it is clear that the symmetric‐key based yoking‐proof schemes are more suitable for the RFID applications than the public‐key based yoking‐proof schemes.…”
Section: Introductionmentioning
confidence: 99%