A Secure and Efficient Two-Party Protocol Enabling Ownership Transfer of RFID Objects

被引:1
|
作者
Bi, Ye [1 ]
Fan, Kai [1 ]
Zhang, Kuan [2 ]
Bai, Yuhan [1 ]
Li, Hui [1 ]
Yang, Yintang [3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Univ Nebraska Lincoln, Dept Elect & Comp Engn, Lincoln, NE 68588 USA
[3] Xidian Univ, Key Lab Minist Educ Wide Band Gap Semicond Mat &, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
New owner privacy; ownership transfer; permutation function; protocol; RFID; ultralightweight; AUTHENTICATION PROTOCOL; INTERNET; SCHEME; IOT; KEY;
D O I
10.1109/JIOT.2023.3267501
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern business models improve the efficiency of supply chain management by attaching tags to products. These tagged products typically change owners multiple times during their life cycles. The ownership transfer protocol authorizes the new owner by replacing the old owner's authentication information stored in the tag with the new owner's. Until now, a considerable amount of literature has proposed solutions to the problem of RFID ownership transfer. Unfortunately, these existing protocols are either flawed in some security properties especially in protecting new and old owners' privacy, or are associated with huge computational overheads. In this article, we propose an ultralightweight RFID ownership transfer protocol based on permutation function. The tag and reader only use efficient bit operations, which greatly reduce the computational overhead. An important feature of the proposed protocol is that the new owner can impose calculations on data that has been encrypted by the old owner. The new owner is authorized by the old owner and does not have access to the tag's key, which protects the old owner's privacy stored in the tag side. We compare our protocol with existing work, and show the advantages in terms of security, computational overhead, and time cost.
引用
收藏
页码:16225 / 16237
页数:13
相关论文
共 50 条
  • [1] An Efficient and Secure RFID Protocol with Ownership Transfer
    Tsai, Hsin-Ruey
    Horng, Gwoboa
    Chen, Yu-Chi
    [J]. 2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 592 - 597
  • [2] TPOT: a Two-party Privacy-preserving Ownership Transfer Protocol for RFID Tags
    Yin, Xi
    An, Zhulin
    Xu, Yongjun
    Long, Hua
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [3] An efficient protocol for fair secure two-party computation
    Kiraz, Mehmet S.
    Schoenmakers, Berry
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 88 - 105
  • [4] 2P-mtOTP: A Secure, Two-Party, Ownership Transfer Protocol for Multiple RFID Tags based on Quadratic Residues
    Cherneva, Vanya
    Trahan, Jerry L.
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON RFID (IEEE RFID 2022), 2022, : 29 - 34
  • [5] An Efficient Secure Two-Party Approximate Pattern Matching Protocol
    Xu L.
    Wei X.
    Cai G.
    Wang H.
    Zheng Z.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (08): : 1819 - 1830
  • [6] Secure "Ratio" Computation and Efficient Protocol for General Secure Two-Party Comparison
    Gong, Linming
    Li, Shundong
    Wu, Chunying
    Wang, Daoshun
    [J]. IEEE ACCESS, 2018, 6 : 25532 - 25542
  • [7] Efficient Secure Two-Party Exponentiation
    Yu, Ching-Hua
    Chow, Sherman S. M.
    Chung, Kai-Min
    Liu, Feng-Hao
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 17 - +
  • [8] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    Yehuda Lindell
    Benny Pinkas
    [J]. Journal of Cryptology, 2015, 28 : 312 - 350
  • [9] Variance: Secure Two-Party Protocol for Efficient Asset Comparison in Bitcoin
    Holmes, Joshua
    Dagher, Gaby G.
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020), 2020, : 62 - 71
  • [10] An efficient protocol tor the problem of secure two-party vector dominance
    Sang, YP
    Shen, H
    Zhang, ZH
    [J]. PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 488 - 492