Skip to main content

2016 | OriginalPaper | Buchkapitel

How to Demonstrate Our Presence Without Disclosing Identity? Evidence from a Grouping-Proof Protocol

verfasst von : Yunhui Zhuang, Gerhard P. Hancke, Duncan S. Wong

Erschienen in: Information Security Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The recent hot debate on sharing economy has been an emergence in a dynamic ownership economy, which attracts lots of attentions in the news media. The concept and practice of resource sharing have been fast becoming a mainstream phenomenon across the world. People share assets to their friends via Internet or smartphones. Meanwhile, researchers are now beginning to weigh in with deeper analysis in terms of security and privacy, which turn out to be one critical area of argument when sharing the items with others. To securely track the location of an item is of high importance in many mobile applications, which rely heavily on the notion of device proximity. In addition to securely and precisely determining an item’s location, it is also desirable to preserve the privacy and untraceability of the item. Grouping-proof protocols are often used to prove the presence of a group of Provers to the Verifier at the same time. In this paper, we propose a new grouping-proof protocol that is well deployed in proximity identification systems for sharing economy, where each Prover needs to demonstrate its presence to the Verifier without disclosing its real identity. Our protocol is mutually authenticated and secure against all known attacks in a grouping-proof setting. Furthermore, the protocol retains the untraceability of a tag through forward privacy and prevents de-synchronization attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Bolotnyy, L., Robins, G.: Generalized “yoking-proofs” for a group of rfid tags. In: Third Annual International Conference on Mobile and Ubiquitous Systems: Networking Services, pp. 1–4, July 2006 Bolotnyy, L., Robins, G.: Generalized “yoking-proofs” for a group of rfid tags. In: Third Annual International Conference on Mobile and Ubiquitous Systems: Networking Services, pp. 1–4, July 2006
3.
Zurück zum Zitat Burmester, M., de Medeiros, B., Motta, R.: Provably secure grouping-proofs for RFID tags. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 176–190. Springer, Heidelberg (2008)CrossRef Burmester, M., de Medeiros, B., Motta, R.: Provably secure grouping-proofs for RFID tags. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 176–190. Springer, Heidelberg (2008)CrossRef
4.
Zurück zum Zitat Chien, H.Y., Liu, S.B.: Tree-based RFID yoking proof. In: NSWCTC 2009. vol. 1, pp. 550–553 (2009) Chien, H.Y., Liu, S.B.: Tree-based RFID yoking proof. In: NSWCTC 2009. vol. 1, pp. 550–553 (2009)
5.
Zurück zum Zitat Cho, J.S., Yeo, S.S., Hwang, S., Rhee, S.Y., Kim, S.K.: Enhanced yoking proof protocols for rfid tags and tag groups. In: Advanced Information Networking and Applications - Workshops, AINAW 2008, pp. 1591–1596, March 2008 Cho, J.S., Yeo, S.S., Hwang, S., Rhee, S.Y., Kim, S.K.: Enhanced yoking proof protocols for rfid tags and tag groups. In: Advanced Information Networking and Applications - Workshops, AINAW 2008, pp. 1591–1596, March 2008
6.
Zurück zum Zitat D’Arco, P.: An almost-optimal forward-private RFID mutual authentication protocol with tag control. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 69–84. Springer, Heidelberg (2011) D’Arco, P.: An almost-optimal forward-private RFID mutual authentication protocol with tag control. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 69–84. Springer, Heidelberg (2011)
7.
Zurück zum Zitat Ha, J.H., Moon, S.-J., Zhou, J., Ha, J.C.: A new formal proof model for RFID location privacy. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 267–281. Springer, Heidelberg (2008)CrossRef Ha, J.H., Moon, S.-J., Zhou, J., Ha, J.C.: A new formal proof model for RFID location privacy. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 267–281. Springer, Heidelberg (2008)CrossRef
8.
Zurück zum Zitat Hermans, J., Pashalidis, A., Vercauteren, F., Preneel, B.: A new RFID privacy model. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 568–587. Springer, Heidelberg (2011)CrossRef Hermans, J., Pashalidis, A., Vercauteren, F., Preneel, B.: A new RFID privacy model. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 568–587. Springer, Heidelberg (2011)CrossRef
9.
Zurück zum Zitat Huang, H.H., Ku, C.Y.: A RFID grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6), 467–474 (2009)CrossRef Huang, H.H., Ku, C.Y.: A RFID grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6), 467–474 (2009)CrossRef
10.
Zurück zum Zitat Juels, A.: “yoking-proofs” for RFID tags. In: International Workshop on Pervasive Computing and Communication Security - PerSec 2004, pp. 138–143. IEEE (2004) Juels, A.: “yoking-proofs” for RFID tags. In: International Workshop on Pervasive Computing and Communication Security - PerSec 2004, pp. 138–143. IEEE (2004)
11.
Zurück zum Zitat Juels, A., Weis, S.A.: Defining strong privacy for RFID. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(1), 7:1–7:23 (2009)CrossRef Juels, A., Weis, S.A.: Defining strong privacy for RFID. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(1), 7:1–7:23 (2009)CrossRef
12.
Zurück zum Zitat Li, Y., Deng, R.H., Lai, J., Ma, C.: On two RFID privacy notions and their relations. ACM Trans. Inf. Syst. Secur. 14(4), 30:1–30:23 (2008) Li, Y., Deng, R.H., Lai, J., Ma, C.: On two RFID privacy notions and their relations. ACM Trans. Inf. Syst. Secur. 14(4), 30:1–30:23 (2008)
13.
Zurück zum Zitat Lin, C.-C., Lai, Y.-C., Tygar, J.D., Yang, C.-K., Chiang, C.-L.: Coexistence proof using chain of timestamps for multiple RFID tags. In: Chang, K.C.-C., Wang, W., Chen, L., Ellis, C.A., Hsu, C.-H., Tsoi, A.C., Wang, H. (eds.) APWeb/WAIM 2007. LNCS, vol. 4537, pp. 634–643. Springer, Heidelberg (2007)CrossRef Lin, C.-C., Lai, Y.-C., Tygar, J.D., Yang, C.-K., Chiang, C.-L.: Coexistence proof using chain of timestamps for multiple RFID tags. In: Chang, K.C.-C., Wang, W., Chen, L., Ellis, C.A., Hsu, C.-H., Tsoi, A.C., Wang, H. (eds.) APWeb/WAIM 2007. LNCS, vol. 4537, pp. 634–643. Springer, Heidelberg (2007)CrossRef
15.
Zurück zum Zitat Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “privacy-friendly” tags. In: RFID Privacy Workshop. MIT, Massachusetts, USA (2003) Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to “privacy-friendly” tags. In: RFID Privacy Workshop. MIT, Massachusetts, USA (2003)
16.
Zurück zum Zitat Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Solving the simultaneous scanning problem anonymously: Clumping proofs for RFID tags. In: 2007 Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU 2007, pp. 55–60. IEEE (2007) Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Solving the simultaneous scanning problem anonymously: Clumping proofs for RFID tags. In: 2007 Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU 2007, pp. 55–60. IEEE (2007)
17.
Zurück zum Zitat Peris-Lopez, P., Orfila, A., Hernandez-Castro, J.C., van der Lubbe, J.C.A.: Flaws on RFID grouping-proofs. guidelines for future sound protocols. J. Netw. Comput. Appl. 34(3), 833–845 (2011)CrossRef Peris-Lopez, P., Orfila, A., Hernandez-Castro, J.C., van der Lubbe, J.C.A.: Flaws on RFID grouping-proofs. guidelines for future sound protocols. J. Netw. Comput. Appl. 34(3), 833–845 (2011)CrossRef
18.
Zurück zum Zitat Piramuthu, S.: On existence proofs for multiple RFID tags. In: Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU 2006. IEEE, June 2006 Piramuthu, S.: On existence proofs for multiple RFID tags. In: Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU 2006. IEEE, June 2006
19.
Zurück zum Zitat Saito, J., Kouichi, S.: Grouping proof for RFID tags. In: Conference on Advanced Information Networking and Applications - AINA, vol. 2, pp. 621–624. IEEE, March 2005 Saito, J., Kouichi, S.: Grouping proof for RFID tags. In: Conference on Advanced Information Networking and Applications - AINA, vol. 2, pp. 621–624. IEEE, March 2005
20.
Zurück zum Zitat Le, T., Burmester, M., Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: ACM Symposium on Information. Computer and Communications Security - ASIACCS 2007, pp. 242–252. ACM, Singapore, March 2007 Le, T., Burmester, M., Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: ACM Symposium on Information. Computer and Communications Security - ASIACCS 2007, pp. 242–252. ACM, Singapore, March 2007
21.
Zurück zum Zitat Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007)CrossRef Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68–87. Springer, Heidelberg (2007)CrossRef
22.
Zurück zum Zitat Yang, A., Liang, K., Zhuang, Y., Wong, D.S., Jia, X.: A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction. Secur. Commun. Netw. 8(16), 2836–2849 (2015)CrossRef Yang, A., Liang, K., Zhuang, Y., Wong, D.S., Jia, X.: A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction. Secur. Commun. Netw. 8(16), 2836–2849 (2015)CrossRef
23.
Zurück zum Zitat Zhuang, Y., Yang, A., Wong, D.S., Yang, G., Xie, Q.: A highly efficient RFID distance bounding protocol without real-time PRF evaluation. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 451–464. Springer, Heidelberg (2013)CrossRef Zhuang, Y., Yang, A., Wong, D.S., Yang, G., Xie, Q.: A highly efficient RFID distance bounding protocol without real-time PRF evaluation. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 451–464. Springer, Heidelberg (2013)CrossRef
Metadaten
Titel
How to Demonstrate Our Presence Without Disclosing Identity? Evidence from a Grouping-Proof Protocol
verfasst von
Yunhui Zhuang
Gerhard P. Hancke
Duncan S. Wong
Copyright-Jahr
2016
Verlag
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-319-31875-2_35