How to Demonstrate Our Presence without Disclosing Identity? Evidence from a Grouping-Proof Protocol

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

4 Scopus Citations
View graph of relations

Author(s)

Related Research Unit(s)

Detail(s)

Original languageEnglish
Title of host publicationInformation Security Applications
Subtitle of host publication16th International Workshop, WISA 2015, Jeju Island, Korea, August 20–22, 2015, Revised Selected Papers
EditorsHo-won Kim, Dooho Choi
PublisherSpringer
Pages423-435
ISBN (electronic)9783319318752
ISBN (print)9783319318745
Publication statusPublished - Aug 2015

Publication series

NameLecture Notes in Computer Science
Volume9503
ISSN (Print)0302-9743
ISSN (electronic)1611-3349

Conference

Title16th International Workshop on Information Security Applications (WISA 2015)
PlaceKorea, Republic of
CityJeju Island
Period20 - 22 August 2015

Abstract

The recent hot debate on sharing economy has been an emergence in a dynamic ownership economy, which attracts lots of attentions in the news media. The concept and practice of resource sharing have been fast becoming a mainstream phenomenon across the world. People share assets to their friends via Internet or smartphones. Meanwhile, researchers are now beginning to weigh in with deeper analysis in terms of security and privacy, which turn out to be one critical area of argument when sharing the items with others. To securely track the location of an item is of high importance in many mobile applications, which rely heavily on the notion of device proximity. In addition to securely and precisely determining an item’s location, it is also desirable to preserve the privacy and untraceability of the item. Grouping-proof protocols are often used to prove the presence of a group of Provers to the Verifier at the same time. In this paper, we propose a new grouping-proof protocol that is well deployed in proximity identification systems for sharing economy, where each Prover needs to demonstrate its presence to the Verifier without disclosing its real identity. Our protocol is mutually authenticated and secure against all known attacks in a grouping-proof setting. Furthermore, the protocol retains the untraceability of a tag through forward privacy and prevents de-synchronization attacks.

Research Area(s)

  • Forward privacy, Grouping-proof, RFID, Sharing economy, Wireless sensor networks

Citation Format(s)

How to Demonstrate Our Presence without Disclosing Identity? Evidence from a Grouping-Proof Protocol. / Zhuang, Yunhui; Hancke, Gerhard P.; Wong, Duncan S.
Information Security Applications: 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20–22, 2015, Revised Selected Papers. ed. / Ho-won Kim; Dooho Choi. Springer, 2015. p. 423-435 (Lecture Notes in Computer Science; Vol. 9503).

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review