Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs

被引:30
|
作者
Batina, Lejla [1 ,2 ,3 ]
Lee, Yong Ki [4 ]
Seys, Stefaan [1 ,2 ]
Singelee, Dave [1 ,2 ]
Verbauwhede, Ingrid [1 ,2 ]
机构
[1] Univ Louvain, Dept Elect Engn SCD COSIC, Louvain, Belgium
[2] Univ Louvain, IBBT, Louvain, Belgium
[3] Radboud Univ Nijmegen, Inst Comp & Informat Sci, NL-6525 ED Nijmegen, Netherlands
[4] Samsung Elect Res & Dev, Kyonggi Do, South Korea
关键词
RFID; Authentication; Grouping proofs; ECC; Privacy; ELLIPTIC-CURVES; PROCESSOR; MODELS;
D O I
10.1007/s00779-011-0392-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to generate evidence that they have been scanned simultaneously, various new schemes have been proposed. Their common property is the use of symmetric-key primitives. However, it has been shown that such schemes often entail scalability, security and/or privacy problems. In this article, we extend the notion of public-key RFID authentication protocols and propose a privacy-preserving multi-party grouping-proof protocol which relies exclusively on the use of elliptic curve cryptography (ECC). It allows to generate a proof which is verifiable by a trusted verifier in an offline setting, even when readers or tags are potentially untrusted, and it is privacy-preserving in the setting of a narrow-strong attacker. We also demonstrate that our RFID grouping-proof protocol can easily be extended to use cases with more than two tags, without any additional cost for an RFID tag. To illustrate the implementation feasibility of our proposed solutions, we present a novel ECC hardware architecture designed for RFID.
引用
收藏
页码:323 / 335
页数:13
相关论文
共 50 条
  • [1] Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
    Lejla Batina
    Yong Ki Lee
    Stefaan Seys
    Dave Singelée
    Ingrid Verbauwhede
    [J]. Personal and Ubiquitous Computing, 2012, 16 : 323 - 335
  • [2] Privacy-Preserving ECC-Based Grouping Proofs for RFID
    Batina, Lejla
    Lee, Yong Ki
    Seys, Stefaan
    [J]. INFORMATION SECURITY, 2011, 6531 : 159 - +
  • [3] Privacy-Preserving Authorized RFID Authentication Protocols
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2014, 2014, 8651 : 108 - 122
  • [4] Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols
    Chen, Chang
    Yang, Guoyu
    Li, Zhihao
    Xiao, Fuan
    Chen, Qi
    Li, Jin
    [J]. CRYPTOGRAPHY, 2024, 8 (01)
  • [5] Secure Multi-Party Computation-Based Privacy-Preserving Authentication for Smart Cities
    Sucasas, Victor
    Aly, Abdelrahaman
    Mantas, Georgios
    Rodriguez, Jonathan
    Aaraj, Najwa
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) : 3555 - 3572
  • [6] A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing
    Shukla, Shivangi
    Patel, Sankita J.
    [J]. COMPUTING, 2022, 104 (05) : 1173 - 1202
  • [7] Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets
    Neugebauer, Georg
    Meyer, Ulrike
    Wetzel, Susanne
    [J]. INFORMATION SECURITY, 2011, 6531 : 136 - +
  • [8] A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing
    Shivangi Shukla
    Sankita J. Patel
    [J]. Computing, 2022, 104 : 1173 - 1202
  • [9] A Robust Privacy-Preserving ECC-Based Three-Factor Authentication Scheme for Metaverse Environment
    Thakur, Garima
    Kumar, Pankaj
    Chen, Chein-Ming
    Vasilakos, Athanasios V.
    Anchna
    Prajapat, Sunil
    [J]. COMPUTER COMMUNICATIONS, 2023, 211 : 271 - 285
  • [10] A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols
    Liao, Yi-Pin
    Hsiao, Chih-Ming
    [J]. Liao, Y.-P. (newsun87@mail.sju.edu.tw), 2013, Springer Science and Business Media Deutschland GmbH (21): : 1 - 13