Premium
One‐round provably secure yoking‐proof for RFID applications
Author(s) -
Sun DaZhi,
Zhu ZeGuang,
Xu GuangQuan,
Guo Wei
Publication year - 2018
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.4931
Subject(s) - scheme (mathematics) , computer science , timestamp , proof of concept , radio frequency identification , computer security , theoretical computer science , computer network , mathematics , operating system , mathematical analysis
Summary The yoking‐proof is the evidence that two or more RFID (Radio Frequency Identification) tags have been scanned simultaneously. Thanks to the IoT (Internet of Things), the yoking‐proof scheme becomes a very useful mechanism in many application areas such as health care and supply chain. However, the existing yoking‐proof schemes require two or more rounds of communication to generate the yoking‐proof. Following our idea presented in IEEE TrustCom 2017, we further investigate how to design the one‐round yoking‐proof scheme with efficiency advantage. Our contributions are threefold: (1) we propose a new timestamp‐based scheme for the RFID tag pair; (2) we prove the security and privacy of the proposed scheme under our models; (3) the proposed scheme is extended for the m > 2 RFID tags. In addition, the extended scheme still maintains one‐round of communication to generate the yoking‐proof.