Anonymous Yoking-Group Proofs

Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifier can check whether two tags are simultaneously scanned by a reader. We consider a scenario that multi-group of tags can be proved to be scanned simultaneously. Grouping-proof, which is an extension of yoking-proofs, allows multiple tags to be proved together, while existing protocols cannot support multiple groups. In this paper, we introduce a novel concept called "yoking-group proofs". Additionally, we propose an anonymous yoking-proof protocol and an anonymous yoking-group proof protocol and prove their security in Universal Composability framework.

[1]  Mike Burmester,et al.  Provably Secure Grouping-proofs for RFID tags , 2008, IACR Cryptol. ePrint Arch..

[2]  L. Bolotnyy,et al.  Generalized "Yoking-Proofs" for a Group of RFID Tags , 2006, 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops.

[3]  Robert H. Deng,et al.  Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols , 2008, J. Softw..

[4]  Cheng-Yuan Ku,et al.  A RFID Grouping Proof Protocol for Medication Safety of Inpatient , 2009, Journal of Medical Systems.

[5]  Kwangjo Kim,et al.  Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction , 2009, IACR Cryptol. ePrint Arch..

[6]  Ari Juels,et al.  "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[7]  Ingrid Verbauwhede,et al.  Wide-Weak Privacy-Preserving RFID Authentication Protocols , 2010, MOBILIGHT.

[8]  Leonid Bolotnyy,et al.  Generalized "Yoking-Proofs" for a Group of RFID Tags , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.

[9]  Laurence T. Yang,et al.  Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.

[10]  Ingrid Verbauwhede,et al.  Low-cost untraceable authentication protocols for RFID , 2010, WiSec '10.

[11]  Ran Canetti,et al.  Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[12]  Kouichi Sakurai,et al.  Grouping proof for RFID tags , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[13]  T. Sejnowski,et al.  RFID authentication protocol for low-cost tags , 2001 .

[14]  Ingrid Verbauwhede,et al.  Privacy-Preserving ECC-Based Grouping Proofs for RFID , 2010, ISC.

[15]  Mike Burmester,et al.  Lightweight RFID authentication with forward and backward security , 2011, TSEC.

[16]  Jung-Hui Chiu,et al.  Reading order independent grouping proof for RFID tags , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.

[17]  Mike Burmester,et al.  Distributed Group Authentication for RFID Supply Management , 2013, IACR Cryptol. ePrint Arch..

[18]  Juan E. Tapiador,et al.  Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).

[19]  Julio César Hernández Castro,et al.  Flaws on RFID grouping-proofs. Guidelines for future sound protocols , 2011, J. Netw. Comput. Appl..

[20]  Ingrid Verbauwhede,et al.  Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs , 2012, Personal and Ubiquitous Computing.

[21]  Roel Peeters,et al.  Private Yoking Proofs: Attacks, Models and New Provable Constructions , 2012, RFIDSec.

[22]  Hung-Yu Chien,et al.  Two RFID-based Solutions to Enhance Inpatient Medication Safety , 2011, Journal of Medical Systems.