Skip to main content

An ECC-Based Off-line Anonymous Grouping-Proof Protocol

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10656))

Abstract

As more and more items tagged with RFID tags, the grouping-proof technology which is used to provide a coexistence evidence for a group of related items has become widely utilized. Due to the wireless channel used in RFID systems, security risk exists in the communication between the reader and tags. How to ensure the tag’s information security and generate reliable grouping-proof becomes a hot research topic. In this paper, an ECC-based off-line anonymous grouping-proof protocol (EAGP) is proposed. Different from the traditional methods which leave the verification process completely to background server, the EAGP authorizes the reader to verify the validity of group-proof without knowing the identity of tags. From the security analysis, the EAGP can protect the security and privacy of RFID tags, defense impersonations and replay attacks. Furthermore, it has the ability to prevent the system overhead caused by invalid submission of grouping-proofs from reader. As a result, the proposed EAGP equips practical application values.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Juels, A.: “ Yoking-Proofs” for RFID Tags. In: PerCom Workshops, pp. 138–143 (2004)

    Google Scholar 

  2. Peris-Lopez, P., Orfila, A., Mitrokotsa, A., Van der Lubbe, J.C.: A comprehensive RFID solution to enhance inpatient medication safety. Int. J. Med. Inform. 80(1), 13–24 (2011)

    Article  Google Scholar 

  3. Chen, Y.-Y., Tsai, M.-L.: An RFID solution for enhancing inpatient medication safety with real-time verifiable grouping-proof. Int. J. Med. Inform. 83, 70–81 (2014)

    Article  Google Scholar 

  4. Chen, C.-L., Wu, C.-Y.: Using RFID yoking proof protocol to enhance inpatient medication safety. J. Med. Syst. 36, 2849–2864 (2012). Informatics, vol. 80, pp. 13–24 (2011)

    Article  Google Scholar 

  5. Zhou, Z., Liu, Q., Wang, G., Jia, W.: Secure medication scheme using the grouping-proof technology. J. Chin. Comput. Syst. 36, 2349–2353 (2015)

    Google Scholar 

  6. Peris-Lopez, P., Orfila, A., Hernandez-Castro, J.C., van der Lubbe, J.C.A.: Flaws on RFID grouping-proofs. Guidelines for future sound protocols. J. Netw. Comput. Appl. 34, 833–845 (2011)

    Article  Google Scholar 

  7. Xie, K., Cao, J., Wang, X., et al.: Optimal resource allocation for reliable and energy efficient cooperative communications. IEEE Trans. Wirel. Commun. 12, 4994–5007 (2013)

    Article  Google Scholar 

  8. Sundaresan, S., Doss, R., Zhou, W.: Offline grouping proof protocol for RFID systems. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 247–252 (2013)

    Google Scholar 

  9. Liu, H., Ning, H., Zhang, Y., He, D., Xiong, Q., Yang, L.: Grouping-proofs-based authentication protocol for distributed RFID systems. IEEE Trans. Parallel Distrib. Syst. 24(7), 1321–1330 (2013)

    Article  Google Scholar 

  10. Chien, H.-Y., Liu, S.-B.: Tree-based RFID yoking proof. In: 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009, pp. 550–553 (2009)

    Google Scholar 

  11. Lien, Y., Leng, X., Mayes, K., Chiu, J.-H.: Reading order independent grouping proof for RFID tags. In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, pp. 128–136 (2008)

    Google Scholar 

  12. Piramuthu, S.: On existence proofs for multiple RFID tags. In: ACS/IEEE International Conference on Pervasive Services, pp. 317–320 (2006)

    Google Scholar 

  13. Li, N., Mu, Y., Susilo, W., Varadharajan, V.: Anonymous yoking-group proofs. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 615–620 (2015)

    Google Scholar 

  14. Ma, C., Lin, J., Wang, Y., Shang, M.: Offline RFID grouping proofs with trusted timestamps. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 674–681 (2012)

    Google Scholar 

  15. Cho, J.S., Yeo, S.S., Hwang, S., Rhee, S.Y., Kim, S.K.: Enhanced yoking proof protocols for RFID tags and tag groups. In: 22nd International Conference on Advanced Information Networking and Applications - Workshops, AINAW 2008, pp. 1591–1596 (2008)

    Google Scholar 

  16. Hong-yan, K.: Analysis and improvement of ECC-based grouping-proof protocol for RFID. Int. J. Control Autom. 9, 343–352 (2016)

    Article  Google Scholar 

  17. Lo, N.-W., Yeh, K.-H.: Anonymous coexistence proofs for RFID tags. J. Inf. Sci. Eng. 26, 1213–1230 (2010)

    Google Scholar 

  18. Burmester, M., De Medeiros, B., Motta, R.: Provably secure grouping-proofs for RFID tags. In: International Conference on Smart Card Research and Advanced Applications, pp. 176–190 (2008)

    Google Scholar 

  19. Burmester, M., Munilla, J.: An anonymous RFID grouping-proof with missing tag identification. In: 10th IEEE International Conference on Radio-Frequency Identification, pp. 3–5 (2016)

    Google Scholar 

  20. Wolkerstorfer, J.: Is elliptic-curve cryptography suitable to secure RFID tags. In: Handout of the Ecrypt Workshop on RFID and Lightweight Crypto (2005)

    Google Scholar 

  21. Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: An elliptic curve processor suitable For RFID-tags. IACR Cryptology ePrint Archive, vol. 2006 p. 227 (2006)

    Google Scholar 

  22. Batina, L., Lee, Y.K., Seys, S., Singele, D., Verbauwhede, I.: Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Pers. Ubiquit. Comput. 16, 323–335 (2012)

    Article  Google Scholar 

  23. Li, H., Lv, C., Ma, J., et al.: Security analysis of a privacy-preserving ECC-based grouping-proof protocol. J. Convergence Inf. Technol. 6, 113–119 (2011)

    Article  Google Scholar 

  24. Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. IEEE Computer Society (2001)

    Google Scholar 

  25. Lin, Q., Zhang, F.: ECC-based grouping-proof RFID for inpatient medication safety. J. Med. Syst. 36, 3527–3531 (2012)

    Article  Google Scholar 

  26. Menezes, A.: Evaluation of security level of cryptography: the Elliptic Curve Discrete Logarithm Problem (ECDLP). University of Waterloo (2001)

    Google Scholar 

Download references

Acknowledgments

This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61632009, 61472451 and 61402161, the High Level Talents Program of Higher Education in Guangdong Province under Grant Number 2016ZJ01, the Hunan Provincial Education Department of China under Grant Number 2015C0589, the Hunan Provincial Natural Science Foundation of China under Grant Number 2015JJ3046, the Fundamental Research Funds for the Central Universities of Central South University under Grant Number 2016zzts058.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, Z., Liu, P., Liu, Q., Wang, G. (2017). An ECC-Based Off-line Anonymous Grouping-Proof Protocol. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10656. Springer, Cham. https://doi.org/10.1007/978-3-319-72389-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72389-1_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72388-4

  • Online ISBN: 978-3-319-72389-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics