An Efficient Forward Private RFID Protocol

被引:0
|
作者
Berbain, Come [1 ]
Billet, Olivier [1 ]
Etrog, Jonathan [1 ]
Gilbert, Henri [1 ]
机构
[1] Orange Labs, F-92794 Issy Les Moulineaux 9, France
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Radio Frequency IDentifiers (RFID) are low-cost pervasive devices used in various settings for identification purposes although they have originally been introduced to ease the supply chain management, they are already used in many other applications Some of these applications need secure identification and ad-hoc authentication protocols have to be designed for that purpose But the intrusion of RPM in the life of end-users might additionally require a higher level of user-privacy Such security and privacy requirements conflict with the highly constrained environment of RFID systems Ohkubo. Suzuki, and Kinoshita first proposed an appealing RFID protocol that meets the highest privacy requirements However, their scheme and its known variants suffer from limitations in terms of computational complexity and provable security which this paper aims to address We propose a novel forward private authentication scheme built upon less computationally expensive cryptographic ingredients, namely pseudo-random generators and universal hash functions instead of one way hash functions In contrast with existing schemes, we provide security proofs of our construction in the standard model instead of the random oracle model
引用
收藏
页码:43 / 53
页数:11
相关论文
共 50 条
  • [1] Forward private RFID authentication protocol based on universal hash function
    Gao, S. (shujing_g@126.com), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10):
  • [2] A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID
    Cao, Xiaolin
    O'Neill, Maire
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 287 - 292
  • [3] An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control
    D'Arco, Paolo
    INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 69 - 84
  • [4] Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers
    Trujillo-Rasua, Rolando
    Solanas, Agusti
    COMPUTER NETWORKS, 2011, 55 (15) : 3211 - 3223
  • [5] Private and Efficient Set Intersection Protocol For RFID-Based Food Adequacy Check
    Gheid, Zakaria
    Challal, Yacine
    Chen, Lin
    2018 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2018,
  • [6] A Desynchronization Tolerant RFID Private Authentication Protocol
    Yao, Qingsong
    Qi, Yong
    Chen, Ying
    Zhong, Xiao
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2010, 6221 : 120 - +
  • [7] A Secure and Efficient RFID Authentication Protocol
    Yang, Xin
    Yang, Rui-ke
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 417 - 421
  • [8] An Efficient RFID Distance Bounding Protocol
    Zhai, Li
    Wu, ChuanKun
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 367 - 376
  • [9] RFID Forward Secure Authentication Protocol: Flaw and Solution
    Yu, Kin Ying
    Yiu, S. M.
    Hui, C. K.
    CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2, 2009, : 627 - 632
  • [10] A Revised Serverless Authentication Protocol with Forward Security for RFID
    He Lei
    Gan Yong
    Li Na-na
    Zhang Tao
    APPLIED MECHANICS AND MECHANICAL ENGINEERING, PTS 1-3, 2010, 29-32 : 2267 - 2272