中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 会议论文
Title:
offline rfid grouping proofs with trusted timestamps
Author: Ma Cunqing ; Lin Jingqiang ; Wang Yuewu ; Shang Ming
Source: Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
Conference Name: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
Conference Date: June 25, 2012 - June 27, 2012
Issued Date: 2012
Conference Place: Liverpool, United kingdom
Keyword: Ubiquitous computing
Indexed Type: EI
ISBN: 9780769547459
Department: (1) State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China; (2) Graduate University of the Chinese Academy of Sciences Beijing China; (3) China National Software and Service Co. Ltd. Beijing China
Sponsorship: University of Bradford; IEEE Technical Committee on Scalable Computing (TCSC); IEEE; IEEE Computer Society
Abstract: With the wide deployment of RFID applications, RFID security issues are drawing more and more attention. The RFID grouping proof aims to provide a verifiable evidence that two or more RFID tags were scanned simultaneously. It extends the yoking proof for two RFID tags, to prove the coexistence of a set of tags (e.g., some drugs can only be sold in the existence of a prescription). In many grouping proof scenarios, the time when the grouping proof was generated is critical to judge whether a transaction is legal or not, and the protocol usually should work in offline mode. Although lots of grouping proof protocols with various features have been proposed, they either work in online mode or have difficulties in generating a grouping proof with the precise transaction time in offline mode. Therefore, we propose a protocol to generate offline RFID grouping proofs with trusted timestamps, where the verifier can obtain the precise transaction time. As far as we know, it is the first practical offline grouping proof protocol that includes the precise transaction time. Properties, performance evaluation and security analysis of our design are also presented in this paper. © 2012 IEEE.
English Abstract: With the wide deployment of RFID applications, RFID security issues are drawing more and more attention. The RFID grouping proof aims to provide a verifiable evidence that two or more RFID tags were scanned simultaneously. It extends the yoking proof for two RFID tags, to prove the coexistence of a set of tags (e.g., some drugs can only be sold in the existence of a prescription). In many grouping proof scenarios, the time when the grouping proof was generated is critical to judge whether a transaction is legal or not, and the protocol usually should work in offline mode. Although lots of grouping proof protocols with various features have been proposed, they either work in online mode or have difficulties in generating a grouping proof with the precise transaction time in offline mode. Therefore, we propose a protocol to generate offline RFID grouping proofs with trusted timestamps, where the verifier can obtain the precise transaction time. As far as we know, it is the first practical offline grouping proof protocol that includes the precise transaction time. Properties, performance evaluation and security analysis of our design are also presented in this paper. © 2012 IEEE.
Language: 英语
Content Type: 会议论文
URI: http://ir.iscas.ac.cn/handle/311060/15958
Appears in Collections:软件所图书馆_会议论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Ma Cunqing,Lin Jingqiang,Wang Yuewu,et al. offline rfid grouping proofs with trusted timestamps[C]. 见:11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012. Liverpool, United kingdom. June 25, 2012 - June 27, 2012.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Ma Cunqing]'s Articles
[Lin Jingqiang]'s Articles
[Wang Yuewu]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Ma Cunqing]‘s Articles
[Lin Jingqiang]‘s Articles
[Wang Yuewu]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace