During the last years many RFID authentication protocols have been proposed with major or minor success (van Deursen and Radomirović, 2008). Juels (2004) introduced a different and novel problem that aims to evidence that two tags have been simultaneously scanned. He called this kind of evidence a yoking-proof that is supposed to be verifiable offline. Then, some authors suggested the generalization of the proof for a larger number of tags. In this paper, we review the literature published in this research topic and show the security flaws of the proposed protocols, named RFID grouping-proofs generally. More precisely, we cryptanalyze five of the most recent schemes and we also show how our techniques can be applied to older proposals. We p...
Yoking (or grouping) proofs were introduced in 2004 as a security construction for RFID applications...
The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the int...
Several grouping proof protocols have been proposed over the years but they are either found to be v...
During the last years many RFID authentication protocols have been proposed with major or minor succ...
In many fields, multiple RFID tags are often combined into a group to identify an object. An RFID gr...
As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof te...
The yoking-proof is the evidence that two or more RFID (Radio Frequency Identification) tags have be...
Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifi...
RFID Grouping proof convinces an offline verifier that multiple tags are simultaneously scanned. Var...
RFID Grouping proof convinces an offline verifier that multiple tags are simultaneously scanned. Var...
[[abstract]]In 2004, Ari Juels proposed a Yoking-Proofs protocol for RFID systems. Their aim is to p...
Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to generat...
Several grouping proof protocols for RFID systems have been proposed over the years but they are eit...
We investigate an application of RFIDs referred to in the literature as group scanning, in which sev...
The adoption of RFID (Radio Frequency Identification) technology has greatly improved the efficiency...
Yoking (or grouping) proofs were introduced in 2004 as a security construction for RFID applications...
The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the int...
Several grouping proof protocols have been proposed over the years but they are either found to be v...
During the last years many RFID authentication protocols have been proposed with major or minor succ...
In many fields, multiple RFID tags are often combined into a group to identify an object. An RFID gr...
As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof te...
The yoking-proof is the evidence that two or more RFID (Radio Frequency Identification) tags have be...
Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifi...
RFID Grouping proof convinces an offline verifier that multiple tags are simultaneously scanned. Var...
RFID Grouping proof convinces an offline verifier that multiple tags are simultaneously scanned. Var...
[[abstract]]In 2004, Ari Juels proposed a Yoking-Proofs protocol for RFID systems. Their aim is to p...
Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to generat...
Several grouping proof protocols for RFID systems have been proposed over the years but they are eit...
We investigate an application of RFIDs referred to in the literature as group scanning, in which sev...
The adoption of RFID (Radio Frequency Identification) technology has greatly improved the efficiency...
Yoking (or grouping) proofs were introduced in 2004 as a security construction for RFID applications...
The Internet of Things (IoT) is a new technology, which enables objects to exchange data via the int...
Several grouping proof protocols have been proposed over the years but they are either found to be v...