Paper
26 May 2011 Remote object authentication against counterfeiting using elliptic curves
Author Affiliations +
Abstract
This paper aims to provide a remote fingerprint object authentication protocol dedicated to anti-counterfeiting applications. The corresponding security model is given. The suggested scheme is based on an Elliptic Curve Cryptography (ECC) encryption adding a mechanism to control integrity at the verification stage. The privacy constraint useful in many applications leads us to embed a Private Information Retrieval scheme in the protocol. As in a previous SPIE presentation, we begin with an optical reader. We drastically lower the amount of computation made at this stage.
© (2011) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jean Lancrenon, Roland Gillard, and Thierry Fournel "Remote object authentication against counterfeiting using elliptic curves", Proc. SPIE 8063, Mobile Multimedia/Image Processing, Security, and Applications 2011, 80630B (26 May 2011); https://doi.org/10.1117/12.883792
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Databases

Information security

Computer security

Biometrics

Cryptography

Manufacturing

Sensors

Back to Top