Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
@article{Batina2011ExtendingER, title={Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs}, author={L. Batina and Y. Lee and S. Seys and Dave Singel{\'e}e and I. Verbauwhede}, journal={Personal and Ubiquitous Computing}, year={2011}, volume={16}, pages={323-335} }
Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to generate evidence that they have been scanned simultaneously, various new schemes have been proposed. Their common property is the use of symmetric-key primitives. However, it has been shown that such schemes often entail scalability, security and/or privacy problems. In this article, we extend the notion of public-key RFID authentication protocols and propose a privacy-preserving multi-party grouping… CONTINUE READING
Figures, Tables, and Topics from this paper
42 Citations
Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
- Computer Science
- The Journal of Supercomputing
- 2014
- 39
A Privacy-preserving RFID Authenticate Protocols against Man-in-the- middle Attacks
- Computer Science
- 2013
- PDF
An Anonymous Offline RFID Grouping-Proof Protocol
- Computer Science
- Future Internet
- 2018
- 8
- Highly Influenced
- PDF
RFID mutual-authentication protocol with synchronous updated- keys based on Hash function
- Computer Science
- 2015
- 4
Unified privacy analysis of new-found RFID authentication protocols
- Computer Science
- Secur. Commun. Networks
- 2013
- 20
Provably secure two-round RFID grouping proof protocols
- Computer Science
- 2014 IEEE RFID Technology and Applications Conference (RFID-TA)
- 2014
- 5
A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags
- Computer Science
- IEEE Transactions on Information Forensics and Security
- 2014
- 34
References
SHOWING 1-10 OF 64 REFERENCES
On Existence Proofs for Multiple RFID Tags
- Engineering, Computer Science
- 2006 ACS/IEEE International Conference on Pervasive Services
- 2006
- 133
- PDF
Elliptic-Curve-Based Security Processor for RFID
- Computer Science
- IEEE Transactions on Computers
- 2008
- 248
- PDF
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags
- Computer Science
- Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007)
- 2007
- 60
- PDF
Flaws on RFID grouping-proofs. Guidelines for future sound protocols
- Computer Science
- J. Netw. Comput. Appl.
- 2011
- 84
- PDF
EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol
- Computer Science
- 2008 IEEE International Conference on RFID
- 2008
- 120
- PDF