{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:56:08Z","timestamp":1760241368134,"version":"build-2065373602"},"reference-count":32,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof technology is widely utilized to provide a coexistence evidence for a group of related items. Due to the wireless channel used in RFID systems, a security risk exists in the communication between the reader and tags. How to ensure the tag\u2019s information security and to generate reliable grouping-proof becomes a hot research topic. To protect the privacy of tags, the verification of grouping-proof is traditionally executed by the verifier, and the reader is only used to collect the proof data. This approach can cause the reader to submit invalid proof data to the verifier in the event of DoP (Deny of Proof) attack. In this paper, an ECC-based, off-line anonymous grouping-proof protocol (EAGP) is proposed. The protocol authorizes the reader to examine the validity of grouping-proof without knowing the identities of tags. From the security and performance analysis, the EAGP can protect the security and privacy of RFID tags, and defence impersonation and replay attacks. Furthermore, it has the ability to reduce the system overhead caused by the invalid submission of grouping-proofs. As a result, the proposed EAGP equips practical application values.<\/jats:p>","DOI":"10.3390\/fi10010002","type":"journal-article","created":{"date-parts":[[2018,1,3]],"date-time":"2018-01-03T12:00:06Z","timestamp":1514980806000},"page":"2","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["An Anonymous Offline RFID Grouping-Proof Protocol"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6045-5467","authenticated-orcid":false,"given":"Zhibin","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Central South University, Changsha 410083, China"},{"name":"College of Physics and Information Science, Hunan Normal University, Changsha 410012, China"}]},{"given":"Pin","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Central South University, Changsha 410083, China"}]},{"given":"Qin","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China"}]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Educational Software, Guangzhou University, Guangzhou 510006, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,1,1]]},"reference":[{"key":"ref_1","unstructured":"Juels, A. (2004, January 14\u201317). \u201cYoking-proofs\u201d for RFID tags. Proceedings of the IEEE Annual Conference on Pervasive Computing and Communications Workshops, Orlando, FL, USA."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.ijmedinf.2013.06.002","article-title":"An RFID solution for enhancing inpatient medication safety with real-time verifiable grouping-proof","volume":"83","author":"Chen","year":"2014","journal-title":"Int. J. Med. Inform."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2849","DOI":"10.1007\/s10916-011-9763-5","article-title":"Using RFID yoking proof protocol to enhance inpatient medication safety","volume":"36","author":"Chen","year":"2012","journal-title":"J. Med. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.jnca.2010.04.008","article-title":"Flaws on RFID grouping-proofs. Guidelines for future sound protocols","volume":"34","author":"Orfila","year":"2011","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_5","first-page":"2349","article-title":"Secure Medication Scheme Using the Grouping-proof Technology","volume":"36","author":"Zhibin","year":"2015","journal-title":"J. Chin. Comput. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1007\/s10916-008-9207-z","article-title":"A RFID grouping proof protocol for medicationsafety of inpatient","volume":"33","author":"Huang","year":"2009","journal-title":"J. Med. Syst."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s10916-009-9373-7","article-title":"Two RFID-based solutions to enhance inpatient medication safety","volume":"35","author":"Chien","year":"2011","journal-title":"J. Med. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"4994","DOI":"10.1109\/TWC.2013.081913.121709","article-title":"Optimal resource allocation for reliable and energy efficient cooperative communications","volume":"12","author":"Xie","year":"2013","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Pizzolante, R., Carpentieri, B., Castiglione, A., Castiglione, A., and Palmieri, F. (2013, January 3\u20135). Text Compression and Encryption through Smart Devices for Mobile Communication. Proceedings of the 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Taichung, Taiwan.","DOI":"10.1109\/IMIS.2013.121"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1464","DOI":"10.1016\/j.jcss.2014.12.022","article-title":"Modeling energy-efficient secure communications in multi-mode wireless mobile devices","volume":"81","author":"Castiglione","year":"2015","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Sundaresan, S., Doss, R., and Zhou, W. (2013, January 7\u20139). Offline grouping proof protocol for RFID systems. Proceedings of the 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon, France.","DOI":"10.1109\/WiMOB.2013.6673368"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1109\/TPDS.2012.218","article-title":"Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems","volume":"24","author":"Liu","year":"2013","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Chien, H.-Y., and Liu, S.-B. (2009, January 25\u201326). Tree-based RFID yoking proof. Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, China.","DOI":"10.1109\/NSWCTC.2009.316"},{"key":"ref_14","unstructured":"Lien, Y., Leng, X., Mayes, K., and Chiu, J.-H. (2008, January 17\u201320). Reading order independent grouping proof for RFID tags. Proceedings of the Intelligence and Security Informatics, Taipei, China."},{"key":"ref_15","unstructured":"Piramuthu, S. (2006, January 26\u201329). On existence proofs for multiple RFID tags. Proceedings of the 2006 ACS\/IEEE Pervasive Services, Lyon, France."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Li, N., Mu, Y., Susilo, W., and Varadharajan, V. (2015, January 14\u201317). Anonymous yoking-group proofs. Proceedings of the Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, Singapore.","DOI":"10.1145\/2714576.2714609"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ma, C., Lin, J., Wang, Y., and Shang, M. (2012, January 25\u201327). Offline RFID grouping proofs with trusted timestamps. Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK.","DOI":"10.1109\/TrustCom.2012.212"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Cho, J.S., Yeo, S.S., Hwang, S., Rhee, S.Y., and Kim, S.K. (2008, January 25\u201328). Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups. Proceedings of the Advanced Information Networking and Applications\u2014Workshops, Okinawa, Japan.","DOI":"10.1109\/WAINA.2008.204"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"343","DOI":"10.14257\/ijca.2016.9.7.32","article-title":"Analysis and Improvement of ECC-based Grouping-proof Protocol for RFID","volume":"9","author":"Kang","year":"2016","journal-title":"Int. J. Control Autom."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1109\/TIFS.2015.2512533","article-title":"Hierarchical and Shared Access Control","volume":"11","author":"Castiglione","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_21","first-page":"1213","article-title":"Anonymous coexistence proofs for RFID tags","volume":"26","author":"Lo","year":"2010","journal-title":"J. Inf. Sci. Eng."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Burmester, M., De Medeiros, B., and Motta, R. (2008). Provably secure grouping-proofs for RFID tags. International Conference on Smart Card Research and Advanced Applications, Springer.","DOI":"10.1007\/978-3-540-85893-5_13"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Canetti, R. (2001, January 14\u201317). Universally composable security: A new paradigm for cryptographic protocols. Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science, Las Vegas, NV, USA.","DOI":"10.1109\/SFCS.2001.959888"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Burmester, M., and Munilla, J. (2016, January 3\u20135). An Anonymous RFID Grouping-Proof with Missing Tag Identification. Proceedings of the 10th IEEE International Conference on Radio-Frequency Identification, Orlando, FL, USA.","DOI":"10.1109\/RFID.2016.7488020"},{"key":"ref_25","unstructured":"Wolkerstorfer, J. (2005, January 14\u201315). Is elliptic-curve cryptography suitable to secure RFID tags. Proceedings of the Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, Graz, Austria."},{"key":"ref_26","first-page":"227","article-title":"An Elliptic Curve Processor Suitable For RFID-Tags","volume":"2006","author":"Batina","year":"2006","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Lee, Y.K., Batina, L., and Verbauwhede, I. (2009, January 27\u201328). Untraceable RFID authentication protocols: Revision of EC-RAC. Proceedings of the RFID, 2009 IEEE International Conference, Orlando, FL, USA.","DOI":"10.1145\/1741866.1741877"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/s00779-011-0392-2","article-title":"Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs","volume":"16","author":"Batina","year":"2012","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_29","first-page":"113","article-title":"Security Analysis of a Privacy-preserving ECC-based Grouping-proof Protocol","volume":"6","author":"Lv","year":"2011","journal-title":"J. Converg. Inf. Technol."},{"key":"ref_30","unstructured":"Menezes, A. (2001). Evaluation of Security Level of Cryptography: The Elliptic Curve Discrete Logarithm Problem (ECDLP), University of Waterloo."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"3527","DOI":"10.1007\/s10916-011-9757-3","article-title":"ECC-based grouping-proof RFID for inpatient medication safety","volume":"36","author":"Lin","year":"2012","journal-title":"J. Med. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/s10916-014-0116-z","article-title":"Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol","volume":"38","author":"He","year":"2014","journal-title":"J. Med. Syst."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/10\/1\/2\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T14:49:44Z","timestamp":1760194184000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/10\/1\/2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,1]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2018,1]]}},"alternative-id":["fi10010002"],"URL":"https:\/\/doi.org\/10.3390\/fi10010002","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2018,1,1]]}}}