The Community for Technology Leaders
2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (2007)
Espoo, Finland
June 18, 2007 to June 21, 2007
ISBN: 978-1-4244-0992-1
pp: 1-6
Gildas Avoine , Computer Science and Artificial Intelligence Laboratory (CSAIL), Massachusetts Institute of Technology (MIT), avoine@mit.edu
Levente Buttyant , Laboratory of Cryptography and Systems Security (CrySyS), Budapest University of Technology and Economics (BME), Hungary, buttyan@crysys.hu
Tamas Holczer , Laboratory of Cryptography and Systems Security (CrySyS), Budapest University of Technology and Economics (BME), Hungary, holczer@crysys.hu
Istvan Vajda , Laboratory of Cryptography and Systems Security (CrySyS), Budapest University of Technology and Economics (BME), Hungary, vajda@crysys.hu
ABSTRACT
We propose a novel authentication scheme that ensures privacy of the provers. Our scheme is based on symmetric-key cryptography, and therefore, it is well-suited to resource constrained applications in large scale environments. A typical example for such an application is an RFID system, where the provers are low-cost RFID tags, and the number of the tags can potentially be very large. We analyze the proposed scheme and show that it is superior to the well-known key-tree based approach for private authentication both in terms of privacy and efficiency.
INDEX TERMS
CITATION

G. Avoine, T. Holczer, I. Vajda and L. Buttyant, "Group-Based Private Authentication," 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks(WOWMOM), Espoo, Finland, 2007, pp. 1-6.
doi:10.1109/WOWMOM.2007.4351808
89 ms
(Ver 3.3 (11022016))