Share Email Print
cover

Proceedings Paper

Remote object authentication against counterfeiting using elliptic curves
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

This paper aims to provide a remote fingerprint object authentication protocol dedicated to anti-counterfeiting applications. The corresponding security model is given. The suggested scheme is based on an Elliptic Curve Cryptography (ECC) encryption adding a mechanism to control integrity at the verification stage. The privacy constraint useful in many applications leads us to embed a Private Information Retrieval scheme in the protocol. As in a previous SPIE presentation, we begin with an optical reader. We drastically lower the amount of computation made at this stage.

Paper Details

Date Published: 27 May 2011
PDF: 12 pages
Proc. SPIE 8063, Mobile Multimedia/Image Processing, Security, and Applications 2011, 80630B (27 May 2011); doi: 10.1117/12.883792
Show Author Affiliations
Jean Lancrenon, Univ. Joseph Fourier (France)
Roland Gillard, Univ. Joseph Fourier (France)
Thierry Fournel, Lab. H. Curien, CNRS, Univ. Jean Monnet Saint-Etienne (France)


Published in SPIE Proceedings Vol. 8063:
Mobile Multimedia/Image Processing, Security, and Applications 2011
Sos S. Agaian; Sabah A. Jassim; Yingzi Du, Editor(s)

© SPIE. Terms of Use
Back to Top