skip to main content
10.1145/2714576.2714609acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
short-paper

Anonymous Yoking-Group Proofs

Authors Info & Claims
Published:14 April 2015Publication History

ABSTRACT

Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifier can check whether two tags are simultaneously scanned by a reader. We consider a scenario that multi-group of tags can be proved to be scanned simultaneously. Grouping-proof, which is an extension of yoking-proofs, allows multiple tags to be proved together, while existing protocols cannot support multiple groups. In this paper, we introduce a novel concept called "yoking-group proofs". Additionally, we propose an anonymous yoking-proof protocol and an anonymous yoking-group proof protocol and prove their security in Universal Composability framework.

References

  1. L. Batina, Y. K. Lee, S. Seys, D. Singelée, and I. Verbauwhede. Privacy-preserving ecc-based grouping proofs for RFID. In ISC, LNCS, pages 159--165. Springer, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Batina, Y. K. Lee, S. Seys, D. Singelée, and I. Verbauwhede. Extending ecc-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Personal and Ubiquitous Computing, 16(3):323--335, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Bolotnyy and G. Robins. Generalized "yoking-proofs" for a group of RFID tags. In MobiQuitous'05, pages 1--4.Google ScholarGoogle Scholar
  4. M. Burmester, B. de Medeiros, and R. Motta. Provably secure grouping-proofs for RFID tags. In CARDIS, volume 5189 of LNCS, pages 176--190, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Burmester and J. Munilla. Lightweight RFID authentication with forward and backward security. ACM Trans. Inf. Syst. Secur., 14(1):11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Burmester and J. Munilla. Distributed group authentication for RFID supply management. IACR Cryptology ePrint Archive, 2013:779, 2013.Google ScholarGoogle Scholar
  7. R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In FOCS, pages 136--145. IEEE Computer Society, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. H.-Y. Chien, C.-C. Yang, T.-C. Wu, and C.-F. Lee. Two RFID-based solutions to enhance inpatient medication safety. J. Medical Systems, 35(3):369--375, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. N. Duc and K. Kim. Grouping-proof protocol for RFID tags: Security definition and scalable construction. IACR Cryptology ePrint Archive, 2009:609, 2009.Google ScholarGoogle Scholar
  10. J. Hermans and R. Peeters. Private yoking proofs: Attacks, models and new provable constructions. In RFIDSec, LNCS, pages 96--108. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. H.-H. Huang and C.-Y. Ku. A RFID grouping proof protocol for medication safety of inpatient. J. Medical Systems, 33(6):467--474, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Juels. "yoking-proofs" for RFID tags. In PerCom Workshops, pages 138--143. IEEE Computer Society, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Y. K. Lee, L. Batina, D. Singelée, and I. Verbauwhede. Low-cost untraceable authentication protocols for RFID. In WISEC, pages 55--64. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Y. K. Lee, L. Batina, D. Singelée, and I. Verbauwhede. Wide-weak privacy-preserving RFID authentication protocols. In MOBILIGHT, volume 45 of LNCS, Social Informatics and Telecommunications Engineering, pages 254--267. Springer, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  15. T. Li, G. Wang, and R. H. Deng. Security analysis on a family of ultra-lightweight RFID authentication protocols. JSW, 3(3):1--10, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  16. Y. Lien, X. Leng, K. Mayes, and J. Chiu. Reading order independent grouping proof for RFID tags. In ISI 2008, pages 128--136. IEEE, 2008.Google ScholarGoogle Scholar
  17. H. Liu, H. Ning, Y. Zhang, D. He, Q. Xiong, and L. T. Yang. Grouping-proofs-based authentication protocol for distributed RFID systems. IEEE Trans. Parallel Distrib. Syst., 24(7):1321--1330, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estévez-Tapiador, and A. Ribagorda. Solving the simultaneous scanning problem anonymously: Clumping proofs for RFID tags. SECPerU, pages 55--60. IEEE Computer Society, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  19. P. Peris-Lopez, A. Orfila, J. C. Hernandez-Castro, and J. C. A. van der Lubbe. Flaws on RFID grouping-proofs. Guidelines for future sound protocols. J. Network and Computer Applications, 34(3):833--845, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. Saito and K. Sakurai. Grouping proof for RFID tags. In AINA, pages 621--624. IEEE Computer Society, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. B. Song and C. J. Mitchell. RFID authentication protocol for low-cost tags. In WISEC'08, pages 140--147. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Anonymous Yoking-Group Proofs

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
          April 2015
          698 pages
          ISBN:9781450332453
          DOI:10.1145/2714576

          Copyright © 2015 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 April 2015

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          ASIA CCS '15 Paper Acceptance Rate48of269submissions,18%Overall Acceptance Rate418of2,322submissions,18%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader