Traceable privacy of recent provably-secure RFID protocols
One of the main challenges in RFIDs is the design of privacy- preserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authenticate tags but also protect these latter from privacy-violating attacks, ensuring their anonymity and un- traceability: an adve...
Saved in:
Main Authors: | , |
---|---|
Format: | Default Conference proceeding |
Published: |
2008
|
Subjects: | |
Online Access: | https://hdl.handle.net/2134/8157 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | One of the main challenges in RFIDs is the design of privacy- preserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authenticate tags but also protect these latter from privacy-violating attacks, ensuring their anonymity and un- traceability: an adversary should not be able to get any information that would reveal the identity of a tag or would be used for tracing it. In this paper, we analyze some recently proposed RFID authentication proto- cols that came with provable security avours. Our results are the rst known privacy cryptanalysis of the protocols. |
---|