Journal of Medical Systems

, Volume 36, Issue 6, pp 3527–3531 | Cite as

ECC-Based Grouping-Proof RFID for Inpatient Medication Safety

  • Qiping Lin
  • Fangguo ZhangEmail author
Original Paper


Several papers were proposed in which symmetric cryptography was used to design RFID grouping-proof for medication safety in the Journal of Medical Systems. However, if we want to ensure privacy, authentication and protection against the tracking of RFID-tags without losing system scalability, we must design an asymmetric cryptography-based RFID. This paper will propose a new ECC-based grouping-proof for RFID. Our ECC-based grouping-proof reduces the computation of tags and prevents timeout problems from occurring in n-party grouping-proof protocol. Based on asymmetric cryptography, the proposed scheme is practical, secure and efficient for medication applications.


RFID Authentication Medication Elliptic curve cryptography Grouping-proof 



This work is supported by the National Natural Science Foundation of China (No. 61070168).


  1. 1.
    Batina, L., Lee, Y.-K., and Seys, S., Privacy-preserving ECC-based grouping proofs for RFID. In: M. Burmester et al. (Eds.): ISC 2010, LNCS 6531, pp. 159–165, 2011.Google Scholar
  2. 2.
    Chien, H.-Y., Yang, C.-C., Wu, T.-C., and Lee, C.-F., Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst. 35:369–375, 2011. doi: 10.1007/s10916-009-9373-7.CrossRefGoogle Scholar
  3. 3.
    Fan, J., Batina, L., and Verbauwhede, I., Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. In: International workshop on RFID Security and Cryptography—RISC, 2009.Google Scholar
  4. 4.
    Hein, D., Wolkerstorfer, J., and Felber, N., ECC is ready for RFID—a proof in silicon. In: R. Avanzi, L. Keliher, F. Sica (Eds.): SAC 2008, LNCS 5381, pp. 401–413, Springer, 2009.Google Scholar
  5. 5.
    Huang, H.-H., and Ku, C.-Y., A RFID grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33:467–474, 2009.CrossRefGoogle Scholar
  6. 6.
    Juels, A., “Yoking-proofs” for RFID tags. In: PERCOMW 2004, pp. 138–143, IEEE Computer Society, Los Alamitos, 2004.Google Scholar
  7. 7.
    Lee, Y.-K., Sakiyama, K., Batina, L., and Verbauwhede, I., Elliptic-curve-based security processor for RFID. IEEE Trans. Comput. 57(11):1514–1527, 2008.MathSciNetCrossRefGoogle Scholar
  8. 8.
    Min, D., and Yih, Y., Fuzzy logic-based approach to detecting a passive RFID tag in an outpatient clinic. J. Med. Syst. 35:423–432, 2011. doi: 10.1007/s10916-009-9377-3.CrossRefGoogle Scholar
  9. 9.
    Saito, J., Sakurai, K., Grouping Proof for RFID Tags. AINA’05, pp. 621–624, 2005.Google Scholar
  10. 10.
    Schnorr C.-P., Efficient signature generation for smart cards, J. Cryptol. 4(3):161–174, 1991.MathSciNetzbMATHCrossRefGoogle Scholar
  11. 11.
    Shim, H., Uh, Y., Lee, S. H., and Yoon, Y. R., A new specimen management system using RFID technology. J. Med. Syst., 2010. doi: 10.1007/s10916-009-9417-7z.
  12. 12.
    Stahl, J. E., Holt, J. K., and Gagliano, N. J., Understanding performance and behavior of tightly coupled outpatient systems using RFID: initial experience. J. Med. Syst., 2009. doi: 10.1007/s10916-009-9365-7.
  13. 13.
    Sun, P. R., Wang, B. H., and Wu, F., A new method to guard inpatient medication safety by the implementation of RFID. J. Med. Syst. 32:4327–4332, 2008. doi: 10.1007/s10916-008-9137-9.CrossRefGoogle Scholar
  14. 14.
    Wickboldt, A.-K., and Piramuthu, S., Patient safety through RFID: Vulnerabilities in recently proposed grouping protocols. J. Med. Syst., 2010. doi: 10.1007/s10916-010-9487-y.
  15. 15.
    Yu, Y.-C., Hou, T.-W., and Chiang, T.-C., Low cost RFID real lightweight binding proof protocol for medication errors and patient safety. J. Med. Syst., 2010. doi: 10.1007/s10916-010-9546-4.

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  1. 1.School of Information Science and TechnologySun Yat-sen UniversityGuangzhouPeople’s Republic of China
  2. 2.State Key Laboratory of Information Security, Institute of SoftwareChinese Academy of SciencesBeijingPeople’s Republic of China

Personalised recommendations