Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs

  title={Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs},
  author={L. Batina and Y. Lee and S. Seys and Dave Singel{\'e}e and I. Verbauwhede},
  journal={Personal and Ubiquitous Computing},
  • L. Batina, Y. Lee, +2 authors I. Verbauwhede
  • Published 2011
  • Computer Science
  • Personal and Ubiquitous Computing
  • Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to generate evidence that they have been scanned simultaneously, various new schemes have been proposed. Their common property is the use of symmetric-key primitives. However, it has been shown that such schemes often entail scalability, security and/or privacy problems. In this article, we extend the notion of public-key RFID authentication protocols and propose a privacy-preserving multi-party grouping… CONTINUE READING
    42 Citations
    Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
    • M. Farash
    • Computer Science
    • The Journal of Supercomputing
    • 2014
    • 39
    A Privacy-preserving RFID Authenticate Protocols against Man-in-the- middle Attacks
    • PDF
    Designated Attribute-Based Proofs for RFID Applications
    • 12
    • PDF
    An Anonymous Offline RFID Grouping-Proof Protocol
    • 8
    • Highly Influenced
    • PDF
    An ECC-Based Off-line Anonymous Grouping-Proof Protocol
    • 1
    Unified privacy analysis of new-found RFID authentication protocols
    • 20
    Provably secure two-round RFID grouping proof protocols
    • D. Moriyama
    • Computer Science
    • 2014 IEEE RFID Technology and Applications Conference (RFID-TA)
    • 2014
    • 5
    A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags
    • 34


    On Existence Proofs for Multiple RFID Tags
    • S. Piramuthu
    • Engineering, Computer Science
    • 2006 ACS/IEEE International Conference on Pervasive Services
    • 2006
    • 133
    • PDF
    Cryptanalysis of EC-RAC, a RFID Identification Protocol
    • 94
    Provably Secure Grouping-proofs for RFID tags
    • 102
    • PDF
    Low-cost untraceable authentication protocols for RFID
    • 101
    • PDF
    Elliptic-Curve-Based Security Processor for RFID
    • 248
    • PDF
    Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags
    • 60
    • PDF
    Flaws on RFID grouping-proofs. Guidelines for future sound protocols
    • 84
    • PDF
    EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol
    • 120
    • PDF
    On Privacy Models for RFID
    • 402
    • Highly Influential
    • PDF