Traceable Privacy of Recent Provably-Secure RFID Protocols

One of the main challenges in RFIDs is the design of privacy-preserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authenticate tags but also protect these latter from privacy-violating attacks, ensuring their anonymity and untraceability: an adversary should not be able to get any information that would reveal the identity of a tag or would be used for tracing it. In this paper, we analyze some recently proposed RFID authentication protocols that came with provable security flavours. Our results are the first known privacy cryptanalysis of the protocols.


Editor(s):
Bellovin, Steven M.
Gennaro, Rosario
Keromytis, Angelos D.
Yung, Moti
Published in:
Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, 479-489
Presented at:
ACNS 2008 - The 6th International Conference on Applied Cryptography and Network Security, Columbia University, New York, NY, USA, June 2-6, 2008
Year:
2008
Publisher:
Berlin, Springer
Keywords:
Laboratories:




 Record created 2008-10-17, last modified 2018-01-28

External links:
Download fulltextURL
Download fulltextn/a
Rate this document:

Rate this document:
1
2
3
 
(Not yet reviewed)