TPOT: a Two-party Privacy-preserving Ownership Transfer Protocol for RFID Tags

被引:0
|
作者
Yin, Xi [1 ,2 ]
An, Zhulin [2 ]
Xu, Yongjun [2 ]
Long, Hua [1 ]
机构
[1] Kunming Univ Sci & Technol, Fac Informat Engn & Automat, Kunming, Peoples R China
[2] Chinese Acad Sci, Inst Comp Technol, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
hash; ownership transfer; privacy; RFID; security; SECURITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
When embedded in consumer goods, RFID (Radio-Frequency IDentification) tags often suffer from risking customer privacy, especially after the transactions being completed, which makes designing excellent RFID tag ownership transfer protocols more urgent than ever. We propose a hash-based method, TPOT, to transfer RFID tag ownership to customers. For tag owners' privacy protection, our scheme lets readers do ownership transfer instead of back-end servers. Our final result, 4H (four hash calculations) efficiency of ownership transfer on the reader side, outperforms most of previously reported solutions based on hash. TPOT is also suitable for large-scale RFID systems.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Quantum Privacy-preserving Two-party Circle Intersection Protocol Based on Phase-encoded Query
    Li, Zi-Xian
    Yang, Qi
    Feng, Bao
    Liu, Wen-Jie
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2023, 62 (07)
  • [22] IDPriU: A two-party ID-private data union protocol for privacy-preserving machine learning
    Yan, Jianping
    Wei, Lifei
    Qian, Xiansong
    Zhang, Lei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 88
  • [23] Quantum Privacy-preserving Two-party Circle Intersection Protocol Based on Phase-encoded Query
    Zi-Xian Li
    Qi Yang
    Bao Feng
    Wen-Jie Liu
    International Journal of Theoretical Physics, 62
  • [24] Secure and Efficient Two-Party Quantum Scalar Product Protocol With Application to Privacy-Preserving Matrix Multiplication
    Liu, Wen-Jie
    Li, Zi-Xian
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 70 (11) : 4456 - 4469
  • [25] Privacy-Preserving and Undeniable Authentication for Mobile RFID Tags
    Wei, Jiannan
    Li, Nan
    2019 IEEE 20TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2019,
  • [26] Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data
    Chen, Ling
    Yu, Ting
    Chirkova, Rada
    INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016, 2016, 9895 : 187 - 203
  • [27] Privacy-preserving Naive Bayes classification based on secure two-party computation
    Liu, Kun
    Tang, Chunming
    AIMS MATHEMATICS, 2023, 8 (12): : 28517 - 28539
  • [28] Practical Privacy-Preserving Indoor Localization Based on Secure Two-Party Computation
    Nieminen, Raine
    Jarvinen, Kimmo
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (09) : 2877 - 2890
  • [29] Privacy-Preserving Two-Party k-Means Clustering in Malicious Model
    Akhter, Rahena
    Chowdhury, Rownak Jahan
    Emura, Keita
    Islam, Tamzida
    Rahman, Mohammad Shahriar
    Rubaiyat, Nusrat
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 121 - 126
  • [30] Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags
    Figueiredo, Rui
    Zuquete, Andre
    Oliveira e Silva, Tomas
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, RFIDSEC 2014, 2014, 8651 : 36 - 53