Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs.
Lejla BatinaYong Ki LeeStefaan SeysDave SingeléeIngrid VerbauwhedePublished in: Pers. Ubiquitous Comput. (2012)
Keyphrases
- multi party
- privacy preserving
- authentication protocol
- rfid tags
- rfid systems
- security analysis
- radio frequency identification
- public key
- rfid technology
- low cost
- lightweight
- privacy preserving data mining
- privacy preserving distributed data mining
- smart card
- vertically partitioned data
- security requirements
- cost effective
- resource constrained
- data privacy
- sensitive information
- cryptographic protocols
- sensitive data
- private information
- privacy concerns
- security protocols
- security issues
- privacy protection
- encryption scheme
- power consumption
- secret key