Group-based private authentication

Gildas Avoine, L. Buttyán, Tamás Holczer, István Vajda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Citations (Scopus)

Abstract

We propose a novel authentication scheme that ensures privacy of the provers. Our scheme is based on symmetrickey cryptography, and therefore, it is well-suited to resource constrained applications in large scale environments. A typical example for such an application is an RFID system, where the provers are low-cost RFID tags, and the number of the tags can potentially be very large. We analyze the proposed scheme and show that it is superior to the well-known key-tree based approach for private authentication both in terms of privacy and efficiency.

Original languageEnglish
Title of host publication2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM
DOIs
Publication statusPublished - 2007
Event2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM - Espoo, Finland
Duration: Jun 18 2007Jun 21 2007

Other

Other2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM
CountryFinland
CityEspoo
Period6/18/076/21/07

Fingerprint

Radio frequency identification (RFID)
Authentication
privacy
Cryptography
Group
efficiency
costs
resources
Costs

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Computer Networks and Communications
  • Communication

Cite this

Avoine, G., Buttyán, L., Holczer, T., & Vajda, I. (2007). Group-based private authentication. In 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM [4351808] https://doi.org/10.1109/WOWMOM.2007.4351808

Group-based private authentication. / Avoine, Gildas; Buttyán, L.; Holczer, Tamás; Vajda, István.

2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM. 2007. 4351808.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Avoine, G, Buttyán, L, Holczer, T & Vajda, I 2007, Group-based private authentication. in 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM., 4351808, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM, Espoo, Finland, 6/18/07. https://doi.org/10.1109/WOWMOM.2007.4351808
Avoine G, Buttyán L, Holczer T, Vajda I. Group-based private authentication. In 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM. 2007. 4351808 https://doi.org/10.1109/WOWMOM.2007.4351808
Avoine, Gildas ; Buttyán, L. ; Holczer, Tamás ; Vajda, István. / Group-based private authentication. 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM. 2007.
@inproceedings{41eec6349da4496c95865bdd7914fa24,
title = "Group-based private authentication",
abstract = "We propose a novel authentication scheme that ensures privacy of the provers. Our scheme is based on symmetrickey cryptography, and therefore, it is well-suited to resource constrained applications in large scale environments. A typical example for such an application is an RFID system, where the provers are low-cost RFID tags, and the number of the tags can potentially be very large. We analyze the proposed scheme and show that it is superior to the well-known key-tree based approach for private authentication both in terms of privacy and efficiency.",
author = "Gildas Avoine and L. Butty{\'a}n and Tam{\'a}s Holczer and Istv{\'a}n Vajda",
year = "2007",
doi = "10.1109/WOWMOM.2007.4351808",
language = "English",
isbn = "1424409926",
booktitle = "2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM",

}

TY - GEN

T1 - Group-based private authentication

AU - Avoine, Gildas

AU - Buttyán, L.

AU - Holczer, Tamás

AU - Vajda, István

PY - 2007

Y1 - 2007

N2 - We propose a novel authentication scheme that ensures privacy of the provers. Our scheme is based on symmetrickey cryptography, and therefore, it is well-suited to resource constrained applications in large scale environments. A typical example for such an application is an RFID system, where the provers are low-cost RFID tags, and the number of the tags can potentially be very large. We analyze the proposed scheme and show that it is superior to the well-known key-tree based approach for private authentication both in terms of privacy and efficiency.

AB - We propose a novel authentication scheme that ensures privacy of the provers. Our scheme is based on symmetrickey cryptography, and therefore, it is well-suited to resource constrained applications in large scale environments. A typical example for such an application is an RFID system, where the provers are low-cost RFID tags, and the number of the tags can potentially be very large. We analyze the proposed scheme and show that it is superior to the well-known key-tree based approach for private authentication both in terms of privacy and efficiency.

UR - http://www.scopus.com/inward/record.url?scp=47749092385&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=47749092385&partnerID=8YFLogxK

U2 - 10.1109/WOWMOM.2007.4351808

DO - 10.1109/WOWMOM.2007.4351808

M3 - Conference contribution

AN - SCOPUS:47749092385

SN - 1424409926

SN - 9781424409921

BT - 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM

ER -