{"title":"Provably secure two-round RFID grouping proof protocols","authors":"D. Moriyama","doi":"10.1109/RFID-TA.2014.6934242","DOIUrl":null,"url":null,"abstract":"A witness to show the coexistence of multiple RFID tags is called grouping-proof and it is useful to handle a lot of commercial products in Internet of Things (IoT). Many of the existing grouping-proof protocols have a common problem that the RFID reader incrementally communicates with the RFID tags in the group and the round complexity is quite high. In this paper, we show that there exists a provably secure RFID grouping-proof protocol which the grouping-proof is generated in the constant round. Especially, we propose two-round RFID grouping-proof protocols secure against the impersonation attack and man-in-the-middle attack, respectively.","PeriodicalId":143130,"journal":{"name":"2014 IEEE RFID Technology and Applications Conference (RFID-TA)","volume":"298 10","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE RFID Technology and Applications Conference (RFID-TA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RFID-TA.2014.6934242","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
A witness to show the coexistence of multiple RFID tags is called grouping-proof and it is useful to handle a lot of commercial products in Internet of Things (IoT). Many of the existing grouping-proof protocols have a common problem that the RFID reader incrementally communicates with the RFID tags in the group and the round complexity is quite high. In this paper, we show that there exists a provably secure RFID grouping-proof protocol which the grouping-proof is generated in the constant round. Especially, we propose two-round RFID grouping-proof protocols secure against the impersonation attack and man-in-the-middle attack, respectively.