RFID Path Authentication, Revisited

作者: Mohammad Saiful Islam Mamun , Atsuko Miyaji

DOI: 10.1109/AINA.2014.150

关键词:

摘要: In an RFID-enabled supply chain, where items are outfitted with RFID tags, path authentication based on tag enables the destination checkpoints to validate route that a has already accessed. this work, we propose novel, efficient, privacy-preserving system for chains. Compared existing Elliptic curve Elgamal Re-encryption (ECElgamal) solution, our Homomorphic Message Code arithmetic circuit (HomMAC) solution offers less memory storage (with limited scalability) and no computational requirement reader. However, unlike previous schemes, allow ability inside consents new privacy direction proposed by Cai et al. in ACNS012. addition, customize polynomial-based scheme (to thwart potential impersonation Denial of Service (DoS) attacks), so it fits protocol.

参考文章(16)
Shaoying Cai, Yingjiu Li, Yunlei Zhao, Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains information security conference. ,vol. 376, pp. 501- 512 ,(2012) , 10.1007/978-3-642-30436-1_41
Dario Catalano, Dario Fiore, Practical Homomorphic MACs for Arithmetic Circuits theory and application of cryptographic techniques. pp. 336- 352 ,(2013) , 10.1007/978-3-642-38348-9_21
Rosario Gennaro, Daniel Wichs, Fully Homomorphic Message Authenticators international conference on the theory and application of cryptology and information security. pp. 301- 320 ,(2013) , 10.1007/978-3-642-42045-0_16
Serge Vaudenay, Khaled Ouafi, Pathchecker: An RFID application for tracing products in Supply-chains The 5th Workshop on RFID Security (RFIDSec 2009). ,(2009)
Jiang Wu, Douglas R. Stinson, A Highly Scalable RFID Authentication Protocol australasian conference on information security and privacy. pp. 360- 376 ,(2009) , 10.1007/978-3-642-02620-1_25
Mohammad S. I. Mamun, Atsuko Miyaji, Mohammad S. Rahman, A Secure and Private RFID Authentication Protocol under SLPN Problem Network and System Security. pp. 476- 489 ,(2012) , 10.1007/978-3-642-34601-9_36
Shaoying Cai, Robert H Deng, Yingjiu Li, Yunlei Zhao, None, A New Framework for Privacy of RFID Path Authentication Applied Cryptography and Network Security. ,vol. 7341, pp. 473- 488 ,(2012) , 10.1007/978-3-642-31284-7_28
Erik-Oliver Blass, Tracker : security and privacy for RFID-based supply chains network and distributed system security symposium. ,(2011)
Mohammad Saiful Islam Mamun, Atsuko Miyaji, A privacy-preserving efficient RFID authentication protocol from SLPN assumption computational science and engineering. ,vol. 10, pp. 234- 243 ,(2015) , 10.1504/IJCSE.2015.068832
Moni Naor, Benny Pinkas, None, Oblivious Polynomial Evaluation SIAM Journal on Computing. ,vol. 35, pp. 1254- 1281 ,(2006) , 10.1137/S0097539704383633