A Anonymous Authorization Scheme Based on ECC for RFID Privacy 


Vol. 33,  No. 3, pp. 293-298, Mar.  2008


PDF
  Abstract

Recently, with the development of mobile techniques and the consideration to conveniency of using, the research on Mobile RFID Reader technique is getting more and more attentions. Until now, all security authentication algorithms of RFID are algorithms about range between Tag and Reader. The range between Reader and backend DB is composed by wired networks, so it’s supposed to be secure range. But it must be taken account of the problem of information security and privacy in wireless range during the design of Mobile REID Reader. In this paper we design an blind signature scheme based on weil-paring finite group's ECC encryption scheme, and by using this blind signature we propose the anonymous authorization scheme to Mobile RFID Reader's users.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

S. Jin, Y. Li, S. Lee, C. Rhee, "A Anonymous Authorization Scheme Based on ECC for RFID Privacy," The Journal of Korean Institute of Communications and Information Sciences, vol. 33, no. 3, pp. 293-298, 2008. DOI: .

[ACM Style]

Shi-Mei Jin, Yong-Zhen Li, Sang-Ho Lee, and Chung-Sei Rhee. 2008. A Anonymous Authorization Scheme Based on ECC for RFID Privacy. The Journal of Korean Institute of Communications and Information Sciences, 33, 3, (2008), 293-298. DOI: .

[KICS Style]

Shi-Mei Jin, Yong-Zhen Li, Sang-Ho Lee, Chung-Sei Rhee, "A Anonymous Authorization Scheme Based on ECC for RFID Privacy," The Journal of Korean Institute of Communications and Information Sciences, vol. 33, no. 3, pp. 293-298, 3. 2008.