2015 IEEE International Conference on RFID (RFID) 2015
DOI: 10.1109/rfid.2015.7113074
|View full text |Cite
|
Sign up to set email alerts
|

Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains

Abstract: Recently, a secret sharing scheme is found to be effective to solve the key distribution problem between parties in RFID-enabled supply chains. However, there is a problem that an attacker might recover the legitimate key by collecting sufficient secret shares when products are carried in the public transportation. In this paper, we propose an effective secret sharing scheme by introducing sufficient number of dummy tags which possess a bogus secret share when the tag-attached products are conveyed. Since an a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…This protocol similarly was designed requiring the use of hash function to ensure the integrity of the transmitted message, which is computationally costly. Toyoda and Sasase [31] proposed a secret sharing scheme which requires to use a large number of dummy tags to solve the tracking issue faced by the approach in [28]. However, this solution has one obvious downside, where additional cost has to be incurred to purchase the extra dummy tags to be later added to the supply chains.…”
Section: Related Workmentioning
confidence: 99%
“…This protocol similarly was designed requiring the use of hash function to ensure the integrity of the transmitted message, which is computationally costly. Toyoda and Sasase [31] proposed a secret sharing scheme which requires to use a large number of dummy tags to solve the tracking issue faced by the approach in [28]. However, this solution has one obvious downside, where additional cost has to be incurred to purchase the extra dummy tags to be later added to the supply chains.…”
Section: Related Workmentioning
confidence: 99%
“…The first approach is to write encrypted EPCs instead of plaintext one. Though an encryption key must be distributed toward a partner side, many researchers solve this problem by splitting an encryption key into multiple shares with a secret sharing scheme and writing into tags on products [6], [8]- [15]. We briefly introduce the fundamental of a secret sharing scheme.…”
Section: Related Workmentioning
confidence: 99%
“…In order to reduce the computation cost, they propose a secret sharing scheme that only requires XOR and addition operations. Toyoda and Sasase propose a secure and robust secret sharing scheme even if an attacker can interrogate all tags [6].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations