TPOT: a Two-party Privacy-preserving Ownership Transfer Protocol for RFID Tags

被引:0
|
作者
Yin, Xi [1 ,2 ]
An, Zhulin [2 ]
Xu, Yongjun [2 ]
Long, Hua [1 ]
机构
[1] Kunming Univ Sci & Technol, Fac Informat Engn & Automat, Kunming, Peoples R China
[2] Chinese Acad Sci, Inst Comp Technol, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
hash; ownership transfer; privacy; RFID; security; SECURITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
When embedded in consumer goods, RFID (Radio-Frequency IDentification) tags often suffer from risking customer privacy, especially after the transactions being completed, which makes designing excellent RFID tag ownership transfer protocols more urgent than ever. We propose a hash-based method, TPOT, to transfer RFID tag ownership to customers. For tag owners' privacy protection, our scheme lets readers do ownership transfer instead of back-end servers. Our final result, 4H (four hash calculations) efficiency of ownership transfer on the reader side, outperforms most of previously reported solutions based on hash. TPOT is also suitable for large-scale RFID systems.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Privacy-Preserving Two-Party Distributed Association Rules Mining on Horizontally Partitioned Data
    Zhang, Feng
    Rong, Chunming
    Zhao, Gansen
    Wu, Jinxia
    Wu, Xiangning
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 633 - 640
  • [32] Privacy Preserving Two-Party Rational Set Computation
    Dou J.-W.
    Liu X.-H.
    Wang W.-L.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (08): : 1397 - 1413
  • [33] An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast
    Costantino, Gianpiero
    Martinelli, Fabio
    Santi, Paolo
    Amoruso, Dario
    2012 10th Annual International Conference on Privacy, Security and Trust, PST 2012, 2012, : 9 - 16
  • [34] ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols
    Niksefat, Salman
    Sadeghiyan, Babak
    Mohassel, Payman
    Sadeghian, Saeed
    COMPUTER JOURNAL, 2014, 57 (04): : 494 - 509
  • [35] Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks
    Liu, Zhusen
    Wang, Luyao
    Bao, Haiyong
    Cao, Zhenfu
    Zhou, Lu
    Liu, Zhe
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (05) : 8007 - 8018
  • [36] Privacy-Preserving Range Query for High-dimensional Uncertain Data in A Two-party Scenario
    Su Shenghao
    Guo Cheng
    Tian Pengxu
    Tang Xinyu
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [37] A Cryptographic Solution to Privacy-Preserving Two-Party Sign Test Computation on Vertically Partitioned Data
    Liu, Meng-chang
    Zhang, Ning
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 1249 - +
  • [38] Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation
    Vanegas, Hernan
    Cabarcas, Daniel
    Aranha, Diego F.
    PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 : 67 - 86
  • [39] An Implementation of Secure Two-Party Computation for Smartphones with Application to Privacy-Preserving Interest-Cast
    Costantino, Gianpiero
    Martinelli, Fabio
    Santi, Paolo
    Amoruso, Dario
    MOBICOM 12: PROCEEDINGS OF THE 18TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2012, : 447 - 449
  • [40] Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing
    Jiang, Zoe L.
    Guo, Ning
    Jin, Yabin
    Lv, Jiazhuo
    Wu, Yulin
    Liu, Zechao
    Fang, Junbin
    Yiu, S. M.
    Wang, Xuan
    INFORMATION SCIENCES, 2020, 518 : 168 - 180