Designated attribute-based proofs for RFID applications

  • Authors:
  • Gergely Alpár;Lejla Batina;Wouter Lueks

  • Affiliations:
  • ICIS/Digital Security group, Radboud University Nijmegen, Nijmegen, The Netherlands,TNO Information and Communication Technology, The Netherlands;ICIS/Digital Security group, Radboud University Nijmegen, Nijmegen, The Netherlands,ESAT/SCD-COSIC and IBBT, K.U. Leuven, Leuven-Heverlee, Belgium;ICIS/Digital Security group, Radboud University Nijmegen, Nijmegen, The Netherlands,TNO Information and Communication Technology, The Netherlands

  • Venue:
  • RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recent research has shown that using public-key cryptography in order to meet privacy requirements for RFID tags is not only necessary, but also now practically feasible. This has led to the development of new protocols like the Randomized Schnorr [6] identification protocol. This protocol ensures that the identity of a tag only becomes known to authorised readers. In this paper we generalize this protocol by introducing an attribute-based identification scheme. The proposed scheme preserves the designation of verification (i.e., only an authorised reader is able to learn the identity of a tag) while it allows tags to prove any subset of their attributes to authorised readers. The proposed scheme is proven to be secure and narrow-strong private.