{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:21:30Z","timestamp":1745986890259,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642361395"},{"type":"electronic","value":"9783642361401"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36140-1_7","type":"book-chapter","created":{"date-parts":[[2013,1,28]],"date-time":"2013-01-28T04:18:48Z","timestamp":1359346728000},"page":"96-108","source":"Crossref","is-referenced-by-count":8,"title":["Private Yoking Proofs: Attacks, Models and New Provable Constructions"],"prefix":"10.1007","author":[{"given":"Jens","family":"Hermans","sequence":"first","affiliation":[]},{"given":"Roel","family":"Peeters","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"7_CR1","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s00779-011-0392-2","volume":"16","author":"L. Batina","year":"2012","unstructured":"Batina, L., Lee, Y.K., Seys, S., Singel\u00e9e, D., Verbauwhede, I.: Extending ECC-Based RFID Authentication Protocols to Privacy-Preserving Multi-Party Grouping Proofs. Journal of Personal and Ubiquitous Computing\u00a016(3), 323\u2013335 (2012)","journal-title":"Journal of Personal and Ubiquitous Computing"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s00145-002-0120-1","volume":"16","author":"M. Bellare","year":"2003","unstructured":"Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The One-More-RSA-Inversion Problems and the Security of Chaums Blind Signature Scheme. Journal of Cryptology\u00a016, 185\u2013215 (2003)","journal-title":"Journal of Cryptology"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Bolotnyy, L., Robins, G.: Generalized \u201cYoking-Proofs\u201d for a Group of RFID Tags. In: Annual International Conference on Mobile and Ubiquitous Systems (MOBIQUITOUS 2006), pp. 1\u20134 (2006)","DOI":"10.1109\/MOBIQ.2006.340395"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-89641-8_11","volume-title":"Cryptology and Network Security","author":"J. Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID Identification Protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol.\u00a05339, pp. 149\u2013161. Springer, Heidelberg (2008)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-85893-5_13","volume-title":"Smart Card Research and Advanced Applications","author":"M. Burmester","year":"2008","unstructured":"Burmester, M., de Medeiros, B., Motta, R.: Provably Secure Grouping-Proofs for RFID Tags. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 176\u2013190. Springer, Heidelberg (2008)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Goldreich, O.: Foundations of Cryptography. Basic Tools, vol.\u00a01. Cambridge University Press (2001)","DOI":"10.1017\/CBO9780511546891"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-642-04159-4_26","volume-title":"Selected Areas in Cryptography","author":"D. Hein","year":"2009","unstructured":"Hein, D., Wolkerstorfer, J., Felber, N.: ECC Is Ready for RFID \u2013 A Proof in Silicon. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol.\u00a05381, pp. 401\u2013413. Springer, Heidelberg (2009)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-23822-2_31","volume-title":"Computer Security \u2013 ESORICS 2011","author":"J. Hermans","year":"2011","unstructured":"Hermans, J., Pashalidis, A., Vercauteren, F., Preneel, B.: A New RFID Privacy Model. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol.\u00a06879, pp. 568\u2013587. Springer, Heidelberg (2011)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Juels, A.: \u201cYoking-Proofs\u201d for RFID Tags. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW 2004), pp. 138\u2013143. IEEE Computer Society (2004)","DOI":"10.1109\/PERCOMW.2004.1276920"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., Batina, L., Singel\u00e9e, D., Verbauwhede, I.: Low-Cost Untraceable Authentication Protocols for RFID (extended version). In: Wetzel, S., Rotaru, C.N., Stajano, F. (eds.) Proceedings of the 3rd ACM Conference on Wireless Network Security (WiSec 2010), pp. 55\u201364. ACM (2010)","DOI":"10.1145\/1741866.1741877"},{"issue":"11","key":"7_CR11","doi-asserted-by":"publisher","first-page":"1514","DOI":"10.1109\/TC.2008.148","volume":"57","author":"Y.K. Lee","year":"2008","unstructured":"Lee, Y.K., Sakiyama, K., Batina, L., Verbauwhede, I.: Elliptic Curve Based Security Processor for RFID. IEEE Transactions on Computer\u00a057(11), 1514\u20131527 (2008)","journal-title":"IEEE Transactions on Computer"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J., Estevez-Tapiador, J., Ribagorda, A.: Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags. In: The Proceedings of the 3rd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007). IEEE Computer Society Press (2007)","DOI":"10.1109\/SECPERU.2007.12"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Piramuthu, S.: On Existence Proofs for Multiple RFID Tags. In: Proceedings of the 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), pp. 317\u2013320. IEEE, IEEE Computer Society Press (2006)","DOI":"10.1109\/PERSER.2006.1652252"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Saito, J., Sakurai, K.: Grouping Proof for RFID Tags. In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), pp. 621\u2013624. IEEE Computer Society (2005)","DOI":"10.1109\/AINA.2005.197"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"C.P. Schnorr","year":"1990","unstructured":"Schnorr, C.P.: Efficient Identification and Signatures for Smart Cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 239\u2013252. Springer, Heidelberg (1990)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Yao, A.C.-C.: Theory and applications of trapdoor functions (extended abstract). In: FOCS, pp. 80\u201391 (1982)","DOI":"10.1109\/SFCS.1982.45"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification. Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36140-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T18:39:54Z","timestamp":1745951994000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36140-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642361395","9783642361401"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36140-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}