Skip to main content
placeholder image

A secure elliptic curve based RFID ownership transfer scheme with controlled delegation

Journal Article


Download full-text (Open Access)

Abstract


  • In practical applications, the owner of an RFID-tagged item canchange. In this paper, we propose a new RFID ownership transfer protocol using elliptic-curve cryptography. The paper first considers security and privacy requirements in the ownership transfer process. Then the paper provides a detailed description of our ownership transfer scheme outlining various protocol phases. Key features of the proposed scheme are that it allows controlled delegation and authorisation recovery, and the ownership transfer is achieved without a trusted third party. We describe a security analysis of the proposed scheme and demonstrate that it meets the desired security and privacy requirements. We also illustrate the performance results and show that our scheme is feasible for lightweight RFID tags.

UOW Authors


  •   Cheng, Shu (external author)
  •   Varadharajan, Vijay (external author)
  •   Mu, Yi (external author)
  •   Susilo, Willy

Publication Date


  • 2013

Citation


  • Cheng, S., Varadharajan, V., Mu, Y. & Susilo, W. (2013). A secure elliptic curve based RFID ownership transfer scheme with controlled delegation. Cryptology and Information Security Series, 11 31-43.

Scopus Eid


  • 2-s2.0-84888117897

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=2934&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/1925

Number Of Pages


  • 12

Start Page


  • 31

End Page


  • 43

Volume


  • 11

Abstract


  • In practical applications, the owner of an RFID-tagged item canchange. In this paper, we propose a new RFID ownership transfer protocol using elliptic-curve cryptography. The paper first considers security and privacy requirements in the ownership transfer process. Then the paper provides a detailed description of our ownership transfer scheme outlining various protocol phases. Key features of the proposed scheme are that it allows controlled delegation and authorisation recovery, and the ownership transfer is achieved without a trusted third party. We describe a security analysis of the proposed scheme and demonstrate that it meets the desired security and privacy requirements. We also illustrate the performance results and show that our scheme is feasible for lightweight RFID tags.

UOW Authors


  •   Cheng, Shu (external author)
  •   Varadharajan, Vijay (external author)
  •   Mu, Yi (external author)
  •   Susilo, Willy

Publication Date


  • 2013

Citation


  • Cheng, S., Varadharajan, V., Mu, Y. & Susilo, W. (2013). A secure elliptic curve based RFID ownership transfer scheme with controlled delegation. Cryptology and Information Security Series, 11 31-43.

Scopus Eid


  • 2-s2.0-84888117897

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=2934&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/1925

Number Of Pages


  • 12

Start Page


  • 31

End Page


  • 43

Volume


  • 11