[go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2012/391

Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy

Shaohui Wang, Sujuan Liu, and Danwei Chen

Abstract

Privacy of RFID systems is receiving increasing attentions in the RFID community and an important issue required as to the security of RFID system. Backward privacy means the adversary can not trace the tag later even if he reveals the internal states of the tag sometimes before. In this paper, we analyze two recently proposed RFID authentication schemes: Randomized GPS and Randomized Hashed GPS scheme. We show both of them can not provide backward privacy in Juels and Weis privacy model, which allows the adversary to know whether the reader authenticates the tag successfully or not. In addition, we present a new protocol, called Challenge-Hiding GPS, based on the Schnorr identification scheme. The challenge is hidden from the eavesdropping through the technique of Diffie-Hellman key agreement protocol. The new protocol can satisfy backward privacy, and it has less communication overheads and almost the same computation, compared with the two schemes analyzed.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
wangshaohui @ njupt edu cn
History
2012-07-19: received
Short URL
https://ia.cr/2012/391
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/391,
      author = {Shaohui Wang and Sujuan Liu and Danwei Chen},
      title = {Analysis and Construction of Efficient {RFID} Authentication Protocol with Backward Privacy},
      howpublished = {Cryptology {ePrint} Archive, Paper 2012/391},
      year = {2012},
      url = {https://eprint.iacr.org/2012/391}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.