TPOT: a Two-party Privacy-preserving Ownership Transfer Protocol for RFID Tags

被引:0
|
作者
Yin, Xi [1 ,2 ]
An, Zhulin [2 ]
Xu, Yongjun [2 ]
Long, Hua [1 ]
机构
[1] Kunming Univ Sci & Technol, Fac Informat Engn & Automat, Kunming, Peoples R China
[2] Chinese Acad Sci, Inst Comp Technol, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
hash; ownership transfer; privacy; RFID; security; SECURITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
When embedded in consumer goods, RFID (Radio-Frequency IDentification) tags often suffer from risking customer privacy, especially after the transactions being completed, which makes designing excellent RFID tag ownership transfer protocols more urgent than ever. We propose a hash-based method, TPOT, to transfer RFID tag ownership to customers. For tag owners' privacy protection, our scheme lets readers do ownership transfer instead of back-end servers. Our final result, 4H (four hash calculations) efficiency of ownership transfer on the reader side, outperforms most of previously reported solutions based on hash. TPOT is also suitable for large-scale RFID systems.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Privacy-preserving Two-party Rational Set Intersection Protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2012, 36 (03): : 277 - 286
  • [2] Privacy-preserving two-party rational set intersection protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    Informatica (Slovenia), 2012, 36 (03): : 277 - 286
  • [3] A Novel Privacy-Preserving Two-Party Vector Dominance Statistic Protocol
    Liu, Jie
    Long, Xiaoli
    Chen, Changpin
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 195 - 196
  • [4] Strong Privacy-preserving Two-party Scalar Product Quantum Protocol
    Run-hua Shi
    Mingwu Zhang
    International Journal of Theoretical Physics, 2019, 58 : 4249 - 4257
  • [5] Strong Privacy-preserving Two-party Scalar Product Quantum Protocol
    Shi, Run-hua
    Zhang, Mingwu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (12) : 4249 - 4257
  • [6] Consensus Control Based on Privacy-Preserving Two-Party Relationship Test Protocol
    Wang, Hanzhou
    Li, Dongyu
    Guan, Zhenyu
    Liu, Yizhong
    Liu, Jianwei
    IEEE CONTROL SYSTEMS LETTERS, 2023, 7 : 2185 - 2190
  • [7] A Secure Two-Party Bartering Protocol Using Privacy-Preserving Interval Operations
    Foerg, Fabian
    Mayer, Daniel
    Wetzel, Susanne
    Wueller, Stefan
    Meyer, Ulrike
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 57 - 66
  • [8] Two-party privacy-preserving agglomerative document clustering
    Su, Chunhua
    Zhou, Jianying
    Bao, Feng
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 193 - +
  • [9] Two-Party Privacy-Preserving Set Intersection with FHE
    Cai, Yunlu
    Tang, Chunming
    Xu, Qiuxia
    ENTROPY, 2020, 22 (12) : 1 - 15
  • [10] Privacy-Preserving Quantum Two-Party Geometric Intersection
    Liu, Wenjie
    Xu, Yong
    Yang, James C. N.
    Yu, Wenbin
    Chi, Lianhua
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (03): : 1237 - 1250