Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs

被引:30
作者
Batina, Lejla [1 ,2 ,3 ]
Lee, Yong Ki [4 ]
Seys, Stefaan [1 ,2 ]
Singelee, Dave [1 ,2 ]
Verbauwhede, Ingrid [1 ,2 ]
机构
[1] Univ Louvain, Dept Elect Engn SCD COSIC, Louvain, Belgium
[2] Univ Louvain, IBBT, Louvain, Belgium
[3] Radboud Univ Nijmegen, Inst Comp & Informat Sci, NL-6525 ED Nijmegen, Netherlands
[4] Samsung Elect Res & Dev, Kyonggi Do, South Korea
关键词
RFID; Authentication; Grouping proofs; ECC; Privacy; ELLIPTIC-CURVES; PROCESSOR; MODELS;
D O I
10.1007/s00779-011-0392-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to generate evidence that they have been scanned simultaneously, various new schemes have been proposed. Their common property is the use of symmetric-key primitives. However, it has been shown that such schemes often entail scalability, security and/or privacy problems. In this article, we extend the notion of public-key RFID authentication protocols and propose a privacy-preserving multi-party grouping-proof protocol which relies exclusively on the use of elliptic curve cryptography (ECC). It allows to generate a proof which is verifiable by a trusted verifier in an offline setting, even when readers or tags are potentially untrusted, and it is privacy-preserving in the setting of a narrow-strong attacker. We also demonstrate that our RFID grouping-proof protocol can easily be extended to use cases with more than two tags, without any additional cost for an RFID tag. To illustrate the implementation feasibility of our proposed solutions, we present a novel ECC hardware architecture designed for RFID.
引用
收藏
页码:323 / 335
页数:13
相关论文
共 35 条
[1]  
Avoine G, 2005, 2005049 CRYPT EPRINT
[2]  
Batina L, 2011, LECT NOTES COMPUT SC, V6531, P159
[3]  
Bock H, 2008, P 4 INT C RAD FREQ I
[4]  
Bolotnyy L, 2006, 2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, P1
[5]  
BRANDS S, 1994, EUROCRYPT, V765, P344
[6]  
Bringer J, 2008, LECT NOTES COMPUT SC, V5339, P149, DOI 10.1007/978-3-540-89641-8_11
[7]  
Burmester M, 2008, LECT NOTES COMPUT SC, V5189, P176, DOI 10.1007/978-3-540-85893-5_13
[8]  
Danev B, 2009, P 18 USENIX SEC S US, P125
[9]  
Deursen T, 2008, 2008310 CRYPT EPRINT
[10]  
Fuerbass F, 2007, IEEE INT SYMP CIRC S, P1835