A hybrid approach for privacy-preserving RFID tags

被引:11
|
作者
Ryu, Eun-Kyung [1 ]
Takagi, Tsuyoshi [2 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
[2] Future Univ Hakodate, Sch Syst Informat Sci, Hakodate, Hokkaido 0418655, Japan
关键词
RFID; Privacy; Security; Authentication; Identification; UNIVERSAL RE-ENCRYPTION;
D O I
10.1016/j.csi.2008.09.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, there have been a considerable amount of works for privacy-preserving RAID tags. However, most existing schemes have a common, inherent problem in the fact that in order to identify only one single tag they require a linear computational complexity on the system side. This problem makes use of the schemes impractical in large-scale RFID deployments. We propose a new scheme for privacy-preserving RFID tags which combines the classical challenge-response mechanism with the idea of one-time pads in a simple but practical way. Our technique has a number of crucial advantages. It supports mutual authentication between reader and tag. It also supports untraceability with no information leakage. Furthermore, the scheme we present requires only one cryptographic operation to identify one device among N, which is an important benefit in large-scale RFID systems. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:812 / 815
页数:4
相关论文
共 50 条
  • [21] Privacy-preserving surveillance: an interdisciplinary approach
    Birnstill, Pascal
    Bretthauer, Sebastian
    Greiner, Simon
    Krempel, Erik
    INTERNATIONAL DATA PRIVACY LAW, 2015, 5 (04) : 298 - 308
  • [22] Privacy-preserving data utilization in hybrid clouds
    Li, Jingwei
    Li, Jin
    Chen, Xiaofeng
    Liu, Zheli
    Jia, Chunfu
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 98 - 106
  • [23] Privacy-Preserving Hybrid K-Means
    Gao, Zhiqiang
    Sun, Yixiao
    Cui, Xiaolong
    Wang, Yutao
    Duan, Yanyu
    Wang, Xu An
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2018, 14 (02) : 1 - 17
  • [24] Hybrid Transformation in Privacy-Preserving Data Mining
    Putri, Awalia W.
    Hira, Laksmiwati
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON DATA AND SOFTWARE ENGINEERING (ICODSE), 2016,
  • [25] Privacy-preserving authentication with low computational overhead for RFID systems
    Liu, Fen
    Hu, Lei
    Lu, Li
    Wang, Weijia
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 127 - 132
  • [26] When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System
    Liu, Xiao
    Liu, An
    Zhang, Xiangliang
    Li, Zhixu
    Liu, Guanfeng
    Zhao, Lei
    Zhou, Xiaofang
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2017), PT I, 2017, 10177 : 576 - 591
  • [27] A Lightweight Privacy-Preserving Mutual Authentication Protocol for RFID Systems
    Fan, Xinxin
    Gong, Guang
    Engels, Daniel W.
    Smith, Eric M.
    2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2011, : 1083 - 1087
  • [28] An Ultralightweight and Privacy-Preserving Authentication Protocol for Mobile RFID Systems
    Niu, Ben
    Zhu, Xiaoyan
    Li, Hui
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1864 - 1869
  • [29] Demo: The Ff Hardware Prototype for Privacy-Preserving RFID Authentication
    Blass, Erik-Oliver
    Elkhiyaoui, Kaoutar
    Molva, Refik
    Savry, Olivier
    Verilhac, Cedric
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 737 - 739
  • [30] Privacy-Preserving ECC-Based Grouping Proofs for RFID
    Batina, Lejla
    Lee, Yong Ki
    Seys, Stefaan
    INFORMATION SECURITY, 2011, 6531 : 159 - +