Supply chain control using a RFID proxy re-signature scheme

2010 
The use of RFID tags allows many new approaches to the old problems of supply chain control and product anti-counterfeiting. Many of the schemes suggested to-date do not adequately meet the needs of the supply chain industry. Some require unjustifiable expense or performance and resilience issues, while others face deployment barriers where the party that deploys the technology is not the party the benefits. Many of the schemes, however, will ultimately fail because they inadequately address the issues of trust and business confidentiality. We present a supply chain control solution using the principle of proxy re-signatures to establish secure and verifiable supply chain paths. Critically our scheme does not require centralized run-time services and provides minimal visibility of supply chain operations to other parties.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    11
    References
    10
    Citations
    NaN
    KQI
    []