2013
DOI: 10.1007/978-3-642-36140-1_5
|View full text |Cite
|
Sign up to set email alerts
|

Designated Attribute-Based Proofs for RFID Applications

Abstract: Abstract. Recent research has shown that using public-key cryptography in order to meet privacy requirements for RFID tags is not only necessary, but also now practically feasible. This has led to the development of new protocols like the Randomized Schnorr [6] identification protocol. This protocol ensures that the identity of a tag only becomes known to authorised readers. In this paper we generalize this protocol by introducing an attribute-based identification scheme. The proposed scheme preserves the desi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 16 publications
(26 reference statements)
0
2
0
Order By: Relevance
“…They have been implemented on smart cards [19,32] resulting in a U-Prove authentication processed under 1 second, while that in Idemix is between 1 and 1.5 seconds. These technologies have also been placed into light-weight infrastructures in [5,6,23]. However, none of the previous research projects proposes to adopt ABC technologies within the IoT.…”
Section: Use Of Attributesmentioning
confidence: 99%
“…They have been implemented on smart cards [19,32] resulting in a U-Prove authentication processed under 1 second, while that in Idemix is between 1 and 1.5 seconds. These technologies have also been placed into light-weight infrastructures in [5,6,23]. However, none of the previous research projects proposes to adopt ABC technologies within the IoT.…”
Section: Use Of Attributesmentioning
confidence: 99%
“…The relative computation cost of a pairing is approximately twenty times higher than that of the scalar multiplication. The model presented by Gergely et al [13] is very efficient in a sensor network but does not guarantee anonymity since the verifier has a database of identifiers. Fuentes et al [14] present a very interesting result in Vehicular ad hoc network but their scheme lacks generality.…”
Section: Introductionmentioning
confidence: 99%