Table 5: ZKP2 Non interactive.
Stages Actions
Bootstrapping p prime number
E elliptic curve in Z
p
P ∈ E
A’s secret a ∈ Z
p
identification
A’s public a ∗ P ∈ E
identification: PuidA
Compromise: A’s secret {x
1
∗ P, x
2
∗ P, · ·· , x
n
∗ P}
∈ E, with x
i
∈
r
Z p
Witness: A → B w = SHA3(x
j
∗ P + x
k
∗ P),
with j, k ∈
r
{1, 2, ··· , n}
Challenge: A ← B e = SHA3(w) ∈ Z
p
Answer: A → B y = x
j
+ x
k
− a ∗ e ∈ Z
p
Verification: B checks SHA3(y ∗ P −e ∗ PuidA)
= w
7 CONCLUSIONS AND FUTURE
WORK
A system that may improve logistics, the classifica-
tion and attention of casualties in hostile situations
such as natural disasters or accidents have been devel-
oped. The tool consists of a mobile application and
a web service. The mobile application performs the
triages and allows to store the results on NFC tags,
that may be attached to victims. It is also possible
to transfer them through a web service to a central-
ized web platform where the information may be pro-
cessed according different user profiles.
Since the services provided are critical, security
on data communication and reliability requirements
have been taken into account.
There are still some points in the system than can
be improved, such as:
• Adding statistical functionalities to the web plat-
form.
• Integrating it with patient’s clinical records.
• Extending the application to perform the second
kind of triage.
ACKNOWLEDGEMENTS
This research has been partially supported by the
Spanish Ministry of Economy and Competitiveness
and Ministry of Science and Innovation under grants
IPT-2012-0585-370000: DEPHISIT and TIN2011-
25452: TUERI.
REFERENCES
NFC and Contactless Technologies. http://www.nfc-
forum.org/aboutnfc/nfc and contactless/.
NFC Forum Official Page. http://www.nfcforum.org/home/.
Alp
´
ar, G., Batina, L., and Verdult, R. (2012). Using
NFC phones for proving credentials. In Proceed-
ings of the 16th international GI/ITG conference on
Measurement, Modelling, and Evaluation of Comput-
ing Systems and Dependability and Fault Tolerance,
MMB’12/DFT’12, pages 317--330, Berlin, Heidel-
berg. SpringerVerlag.
Babar, S., Mahalle, P., Stango, A., Prasad, N., and Prasad,
R. (2010). Proposed security model and threat taxon-
omy for the internet of things (IoT). In Recent Trends
in Network Security and Applications, volume 89 of
Communications in Computer and Information Sci-
ence, pages 420–429. Springer Berlin Heidelberg.
Bertoni, G., Daemen, J., Peeters, M., and Assche,
G. V. The Keccak sponge function family .
http://keccak.noekeon.org/papers.html.
Fiat, A. and Shamir, A. (1987). How to prove your-
self: Practical solutions to identification and signature
problems. pages 186--194. Springer-Verlag.
Hankerson, D., Menezes, A. J., and Vanstone, S. (2003).
Guide to Elliptic Curve Cryptography. Springer-
Verlag New York, Inc., Secaucus, NJ, USA.
Iserson, K. V. and Moskop, J. C. (2007). Triage in medicine,
part i: Concept, history, and types. Annals of Emer-
gency Medicine, 49(3):275 – 281.
Mart
´
ınez, S., Valls, M., Roig, C., Miret, J., and Gin
´
e, F.
(2009). A Secure Elliptic Curve-Based RFID Proto-
col. Journal of Computer Science and Technology,
24(2):309–318.
no, J. A. M. C. El triaje. http://www.dit.upm.es/ janto-
nio/personal/cruzroja/.
Ramzy, I. and Arora, A. (2011). Using zero knowledge to
share a little knowledge: Bootstrapping trust in de-
vice networks. In Stabilization, Safety, and Security
of Distributed Systems, volume 6976 of LNCS, pages
371–385. Springer Berlin Heidelberg.
Ra
´
ul S
´
anchez Bermejo, Carmen Cort
´
es Fadrique, B. R. F.
(2011). El triaje en urgencias en los hospitales
espa
˜
noles. Unidad de Urgencias, Hospital General
Nuestra Se
˜
nora del Prado, Toledo, Espa
˜
na.
WEBIST2014-InternationalConferenceonWebInformationSystemsandTechnologies
242