Traceable privacy of recent provably-secure RFID protocols

作者: Khaled Ouafi , Raphael C. -W. Phan

DOI: 10.1007/978-3-540-68914-0_29

关键词:

摘要: One of the main challenges in RFIDs is design privacy-preserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authenticate tags but also protect these latter from privacy-violating attacks, ensuring their anonymity and untraceability: an adversary be able get any information that would reveal identity a tag or used for tracing it. In this paper, we analyze some recently proposed RFID came with provable security flavours. Our results are first known privacy cryptanalysis

参考文章(43)
Weizhi Meng, Dieter Gollmann, Christian D Jensen, Jianying Zhou, None, Information and Communications Security ,(2008)
Kim-Kwang Raymond Choo, On Session Key Construction Springer, Boston, MA. pp. 1- 16 ,(2009) , 10.1007/978-0-387-87969-7_9
A. Juels, D. Molnar, D. Wagner, Security and Privacy Issues in E-passports international workshop on security. pp. 74- 88 ,(2005) , 10.1109/SECURECOMM.2005.59
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols international conference on cluster computing. pp. 136- 145 ,(2001) , 10.1109/SFCS.2001.959888
Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi, E-passport: the global traceability or how to feel like a UPS package workshop on information security applications. pp. 391- 404 ,(2006) , 10.1007/978-3-540-71093-6_30
Khaled Ouafi, Raphael C. -W. Phan, Privacy of recent RFID authentication protocols information security practice and experience. pp. 263- 277 ,(2008) , 10.1007/978-3-540-79104-1_19
Raphael C. -W. Phan, Bok-Min Goi, Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols Progress in Cryptology - INDOCRYPT 2006. pp. 104- 117 ,(2006) , 10.1007/11941378_9
Raphael C. -W. Phan, Bok-Min Goi, Cryptanalysis of the n-party encrypted diffie-hellman key exchange using different passwords applied cryptography and network security. pp. 226- 238 ,(2006) , 10.1007/11767480_15
Charles Rackoff, Daniel R. Simon, Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack international cryptology conference. pp. 433- 444 ,(1991) , 10.1007/3-540-46766-1_35
Serge Vaudenay, RFID privacy based on public-key cryptography international conference on information security and cryptology. pp. 1- 6 ,(2006) , 10.1007/11927587_1