RFID Privacy Enhanced Protocol for Library Operation (日韓合同ワークショップ 1st Korea-Japan Joint Workshop on Ubiquitous Computing and Networking Systems (ubiCNS 2005))
スポンサーリンク
概要
- 論文の詳細を見る
Radio Frequency IDentification (RFID) is expected to be one of the most important infrastructure technologies for future ubiquitous services. Libraries may quickly adopt item-level tagging, since doing so would dramatically reduce inventory management costs and make possible self-checkout. Despite this advantage, such a wide deployment of item-level tagging may expose new threats to citizens' privacy through the abuse of the powerful tracking capability of the RFID. These threats are critical to book owners and borrowers because books reflect the preferences and thoughts of their owners. This paper clarifies the privacy issues related to use of RFIDs in libraries and proposes a new privacy protection protocol using the Unidentifiable Anonymous-ID scheme, which we have already developed to protect RFID privacy at a very low cost. This protocol not only protects users' privacy but also suits the work done in libraries. We have evaluated the performance of the protocol and have proven its effectiveness.
- 一般社団法人情報処理学会の論文
- 2005-06-09
著者
-
HOSHINO Fumitaka
NTT Information Sharing Platform Laboratories
-
Kinoshita Shingo
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Hoshino Fumitaka
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Morohashi Gembu
Ntt Information Sharing Platform Laboratories Ntt Corporation
関連論文
- Candidate One-Way Functions on Non-Supersingular Elliptic Curves(Elliptic Curve Cryptography, Cryptography and Information Security)
- Non-Supersingular Elliptic Curves for Pairing-Based Cryptosystems(Discrete Mathematics and Its Applications)
- RFID Privacy Enhanced Protocol for Library Operation (日韓合同ワークショップ 1st Korea-Japan Joint Workshop on Ubiquitous Computing and Networking Systems (ubiCNS 2005))
- Lenient/Strict Batch Verification in Several Groups(Special Section on Cryptography and Information Security)
- A Cyclic Window Algorithm for Elliptic Curves over OEF(Special Section on Cryptography and Information Security)