Zero-knowledge undeniable signatures (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Efficient Identification and Signatures for Smart Cards
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Cryptanalysis of EC-RAC, a RFID Identification Protocol
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
ECC Is Ready for RFID --- A Proof in Silicon
Selected Areas in Cryptography
Low-cost untraceable authentication protocols for RFID
Proceedings of the third ACM conference on Wireless network security
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Privacy-preserving ECC-based grouping proofs for RFID
ISC'10 Proceedings of the 13th international conference on Information security
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
Personal and Ubiquitous Computing
Hierarchical ECC-Based RFID authentication protocol
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Hi-index | 0.00 |
Recent research has shown that using public-key cryptography in order to meet privacy requirements for RFID tags is not only necessary, but also now practically feasible. This has led to the development of new protocols like the Randomized Schnorr [6] identification protocol. This protocol ensures that the identity of a tag only becomes known to authorised readers. In this paper we generalize this protocol by introducing an attribute-based identification scheme. The proposed scheme preserves the designation of verification (i.e., only an authorised reader is able to learn the identity of a tag) while it allows tags to prove any subset of their attributes to authorised readers. The proposed scheme is proven to be secure and narrow-strong private.