Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains

Kentaro Toyoda, Iwao Sasase

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Abstract

Recently, a secret sharing scheme is found to be effective to solve the key distribution problem between parties in RFID-enabled supply chains. However, there is a problem that an attacker might recover the legitimate key by collecting sufficient secret shares when products are carried in the public transportation. In this paper, we propose an effective secret sharing scheme by introducing sufficient number of dummy tags which possess a bogus secret share when the tag-attached products are conveyed. Since an attacker cannot see the tags themselves from the outside of the carrying vehicle, he/she cannot distinguish between the legitimate tags and dummy tags and thus has to find out the correct key by iteratively trying each combination of secret shares. On the other hand, the party who receives products can distinguish dummy tags since they are not attached to any product. We also adopt a file privilege and untraceable option which are newly ratified by Gen2v2 (Gen2 version 2) to realize secure and practical RFID-enabled supply chains. We prove that our construction is secure in both the privacy and robustness aspect. We also confirm that our scheme is easily implemented with the off-the-shelf RFID reader and tags.

Original languageEnglish
Title of host publication2015 IEEE International Conference on RFID, RFID 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages63-69
Number of pages7
ISBN (Print)9781479919376
DOIs
Publication statusPublished - 2015 May 26
Event2015 IEEE International Conference on RFID, RFID 2015 - San Diego, United States
Duration: 2015 Apr 152015 Apr 17

Other

Other2015 IEEE International Conference on RFID, RFID 2015
CountryUnited States
CitySan Diego
Period15/4/1515/4/17

Fingerprint

Radio frequency identification (RFID)
Supply chains

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications

Cite this

Toyoda, K., & Sasase, I. (2015). Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains. In 2015 IEEE International Conference on RFID, RFID 2015 (pp. 63-69). [7113074] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/RFID.2015.7113074

Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains. / Toyoda, Kentaro; Sasase, Iwao.

2015 IEEE International Conference on RFID, RFID 2015. Institute of Electrical and Electronics Engineers Inc., 2015. p. 63-69 7113074.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Toyoda, K & Sasase, I 2015, Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains. in 2015 IEEE International Conference on RFID, RFID 2015., 7113074, Institute of Electrical and Electronics Engineers Inc., pp. 63-69, 2015 IEEE International Conference on RFID, RFID 2015, San Diego, United States, 15/4/15. https://doi.org/10.1109/RFID.2015.7113074
Toyoda K, Sasase I. Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains. In 2015 IEEE International Conference on RFID, RFID 2015. Institute of Electrical and Electronics Engineers Inc. 2015. p. 63-69. 7113074 https://doi.org/10.1109/RFID.2015.7113074
Toyoda, Kentaro ; Sasase, Iwao. / Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains. 2015 IEEE International Conference on RFID, RFID 2015. Institute of Electrical and Electronics Engineers Inc., 2015. pp. 63-69
@inproceedings{f21c8f2d7ee74292bfc40a3317d99b52,
title = "Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains",
abstract = "Recently, a secret sharing scheme is found to be effective to solve the key distribution problem between parties in RFID-enabled supply chains. However, there is a problem that an attacker might recover the legitimate key by collecting sufficient secret shares when products are carried in the public transportation. In this paper, we propose an effective secret sharing scheme by introducing sufficient number of dummy tags which possess a bogus secret share when the tag-attached products are conveyed. Since an attacker cannot see the tags themselves from the outside of the carrying vehicle, he/she cannot distinguish between the legitimate tags and dummy tags and thus has to find out the correct key by iteratively trying each combination of secret shares. On the other hand, the party who receives products can distinguish dummy tags since they are not attached to any product. We also adopt a file privilege and untraceable option which are newly ratified by Gen2v2 (Gen2 version 2) to realize secure and practical RFID-enabled supply chains. We prove that our construction is secure in both the privacy and robustness aspect. We also confirm that our scheme is easily implemented with the off-the-shelf RFID reader and tags.",
author = "Kentaro Toyoda and Iwao Sasase",
year = "2015",
month = "5",
day = "26",
doi = "10.1109/RFID.2015.7113074",
language = "English",
isbn = "9781479919376",
pages = "63--69",
booktitle = "2015 IEEE International Conference on RFID, RFID 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Secret sharing based unidirectional key distribution with dummy tags in Gen2v2 RFID-enabled supply chains

AU - Toyoda, Kentaro

AU - Sasase, Iwao

PY - 2015/5/26

Y1 - 2015/5/26

N2 - Recently, a secret sharing scheme is found to be effective to solve the key distribution problem between parties in RFID-enabled supply chains. However, there is a problem that an attacker might recover the legitimate key by collecting sufficient secret shares when products are carried in the public transportation. In this paper, we propose an effective secret sharing scheme by introducing sufficient number of dummy tags which possess a bogus secret share when the tag-attached products are conveyed. Since an attacker cannot see the tags themselves from the outside of the carrying vehicle, he/she cannot distinguish between the legitimate tags and dummy tags and thus has to find out the correct key by iteratively trying each combination of secret shares. On the other hand, the party who receives products can distinguish dummy tags since they are not attached to any product. We also adopt a file privilege and untraceable option which are newly ratified by Gen2v2 (Gen2 version 2) to realize secure and practical RFID-enabled supply chains. We prove that our construction is secure in both the privacy and robustness aspect. We also confirm that our scheme is easily implemented with the off-the-shelf RFID reader and tags.

AB - Recently, a secret sharing scheme is found to be effective to solve the key distribution problem between parties in RFID-enabled supply chains. However, there is a problem that an attacker might recover the legitimate key by collecting sufficient secret shares when products are carried in the public transportation. In this paper, we propose an effective secret sharing scheme by introducing sufficient number of dummy tags which possess a bogus secret share when the tag-attached products are conveyed. Since an attacker cannot see the tags themselves from the outside of the carrying vehicle, he/she cannot distinguish between the legitimate tags and dummy tags and thus has to find out the correct key by iteratively trying each combination of secret shares. On the other hand, the party who receives products can distinguish dummy tags since they are not attached to any product. We also adopt a file privilege and untraceable option which are newly ratified by Gen2v2 (Gen2 version 2) to realize secure and practical RFID-enabled supply chains. We prove that our construction is secure in both the privacy and robustness aspect. We also confirm that our scheme is easily implemented with the off-the-shelf RFID reader and tags.

UR - http://www.scopus.com/inward/record.url?scp=84936817552&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84936817552&partnerID=8YFLogxK

U2 - 10.1109/RFID.2015.7113074

DO - 10.1109/RFID.2015.7113074

M3 - Conference contribution

AN - SCOPUS:84936817552

SN - 9781479919376

SP - 63

EP - 69

BT - 2015 IEEE International Conference on RFID, RFID 2015

PB - Institute of Electrical and Electronics Engineers Inc.

ER -