LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting

Photo from wikipedia

Yoking proof is a very useful security primitive that can be used to prove the co-existence of two or multiple entities in an identification protocol. It can be incorporated into… Click to show full abstract

Yoking proof is a very useful security primitive that can be used to prove the co-existence of two or multiple entities in an identification protocol. It can be incorporated into radio frequency identification (RFID) protocols and used in many practical applications such as pharmaceutical distribution and manufacturing. However, the existing yoking proofs do not support secure key establishment, which is required in order to allow secure communication between the reader and the RFID tags after the identification process. In this paper, we propose a novel yoking proof with key exchange that allows the reader to establish a secure communication channel with the tags. We define the formal security models for yoking proof with key exchange and prove that the proposed protocol can achieve yoking proof soundness, session key security and tag identity privacy.

Keywords: proof; proof key; key exchange; privacy; yoking proof

Journal Title: Wireless Personal Communications
Year Published: 2017

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.