Advertisement

AONT Encryption Based Application Data Management in Mobile RFID Environment

  • Namje Park
  • Youjin Song
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6422)

Abstract

Mobile RFID (radio frequency identification) is a new application that allows the use of a mobile phone as a wireless RFID reader and provides new services to users by integrating RFID and the ubiquitous sensor network infrastructure with mobile communication and wireless internet services. Ensuring the security of mobile RFID’s large-capacity database system by depending only on existing encryption schemes is unrealistic. In this regard, data sharing for security management has drawn attention as an extremely secure scheme. However, applying the existing secret sharing scheme to this method makes the size of the share equal to that of the original data, making it unsuitable for application to a large-scale database. To address this problem, this paper proposes secret sharing algorithms that enable efficient data security management through the use of the characteristics of the all-or-nothing transform (AONT) encryption in RFID middleware.

Keywords

Secret Sharing Secret Sharing Scheme Encryption Mode Threshold Secret Sharing Share Size 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Shamir, A.: How to Share a Secret. Communication of the ACM 22(11), 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Rivest, R.L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210–218. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  3. 3.
    Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A fast (3, n)-threshold secret sharingscheme using exclusive-or operations. IEICE Trans. Fundamentals E91-A(1), 127–138 (2008)CrossRefGoogle Scholar
  4. 4.
    Fujii, Y., Tada, M., Hosaka, N., Tochikubo, K., Kato, T.: Fast (2, n)-threshold scheme and its application. In: Proc. CSS 2005, pp. 631–636 (2005)Google Scholar
  5. 5.
    Tada, M., Fujii, Y., Hosaka, N., Tochikubo, K., Kato, T.: A secret sharing scheme with threshold 3. In: Proc. CSS 2005, pp. 637–642 (2005)Google Scholar
  6. 6.
    Kuwakado, H., Tanaka, H.: Strongly non-separable encryption mode for throwing a media away. Technical Report of IEICE 103(417), 15–18 (2003)Google Scholar
  7. 7.
    Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 455–470. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  8. 8.
    Blum, L., Blum, M., Shub, M.: A Simple Unpredictable Pseudo-Random Number Generator. SIAM Journal on Computing 15, 364–383 (1986)MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Li, Y. (ed.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)Google Scholar
  10. 10.
    Park, N., Kim, S., Won, D., Kim, H.: Security Analysis and Implementation leveraging Globally Networked Mobile RFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  11. 11.
    Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Servicefor Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Namje Park
    • 1
  • Youjin Song
    • 2
  1. 1.Department of Computer Education, Teachers CollegeJeju National University,Jeju Special Self-Governing ProvinceKorea
  2. 2.Department of Information ManagementDongguk UnivertsityGyeongsangbuk-doKorea

Personalised recommendations