Visible to the public One-Round Provably Secure Yoking-Proof for RFID Applications

TitleOne-Round Provably Secure Yoking-Proof for RFID Applications
Publication TypeConference Paper
Year of Publication2017
AuthorsSun, D. Z., Xu, G. Q.
Conference Name2017 IEEE Trustcom/BigDataSE/ICESS
Date PublishedAug. 2017
PublisherIEEE
ISBN Number978-1-5090-4906-6
Keywordsauthentication, cryptography, data privacy, Human Behavior, human factors, Internet of Things, IoT, Moriyama security model, one-round offline yoking-proof scheme, one-round provably secure yoking-proof, privacy, privacy model, privacy protection, provable security, pubcrawl, radiofrequency identification, Resiliency, RFID, RFID applications, RFID tag pair, RFID tagged objects, RFID tags, RFIDs, Tools, yoking-proof
Abstract

Under the Internet of Things (IoT), the coexistence proof of multiple RFID tagged objects becomes a very useful mechanism in many application areas such as health care, evidences in court, and stores. The yoking-proof scheme addresses this issue. However, all existing yoking-proof schemes require two or more rounds communication to generate the yoking-proof. In this paper, we investigate the design of one-round yoking-proof schemes. Our contributions are threefold: (1) to confirm the coexistence of the RFID tag pair, we propose a one-round offline yoking-proof scheme with privacy protection. (2) We define a privacy model of the yoking-proof scheme and enhance Moriyama's security model for the yoking-proof scheme. The security and the privacy of the proposed scheme are proved under our models. (3) We further extend the yoking-proof scheme for the coexistence of m RFID tags, where m\textbackslashtextgreater2. The extended scheme maintains one-round. In addition, the proposed technique has efficiency advantage, compared with previous work.

URLhttps://ieeexplore.ieee.org/document/8029456/
DOI10.1109/Trustcom/BigDataSE/ICESS.2017.253
Citation Keysun_one-round_2017