2011
DOI: 10.1007/978-3-642-18178-8_14
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving ECC-Based Grouping Proofs for RFID

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
55
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 18 publications
(55 citation statements)
references
References 6 publications
0
55
0
Order By: Relevance
“…More precisely, the ECC-based grouping proofs as in [2] require two or three point multiplications and, even in the latter case, running time to complete the proof should stay below 300 ms. In addition our selective disclosure protocol achieves similar performance as hierarchical proofs [1] in which the performance depends on the number of levels in the hierarchy. Similar remarks are valid for the memory requirements of a single tag.…”
Section: Feasibility Of Our Proposalmentioning
confidence: 83%
See 3 more Smart Citations
“…More precisely, the ECC-based grouping proofs as in [2] require two or three point multiplications and, even in the latter case, running time to complete the proof should stay below 300 ms. In addition our selective disclosure protocol achieves similar performance as hierarchical proofs [1] in which the performance depends on the number of levels in the hierarchy. Similar remarks are valid for the memory requirements of a single tag.…”
Section: Feasibility Of Our Proposalmentioning
confidence: 83%
“…Furthermore, showing an ABC does not require more exponentiations on the tag's side than some other protocols demonstrated to be computationally feasible on RFID chips [1,3]. We demonstrate how RFID systems can benefit from the concepts of ABCs in such a way that a tag proves all or a subset of its secret attributes to designated verifier readers.…”
Section: Introductionmentioning
confidence: 89%
See 2 more Smart Citations
“…Recently, Batina et al have proposed a new privacy-preserving elliptic curve based grouping-proof protocol with colluding tag prevention (denoted by CTP protocol) [13]. The protocol is claimed to be resistant against all active attacks applied on the previous grouping proof protocols and also fulfil the privacy against a narrow-strong adversary.…”
Section: Introductionmentioning
confidence: 99%