2013
DOI: 10.1007/978-3-642-38530-8_7
|View full text |Cite
|
Sign up to set email alerts
|

A Forward Privacy Model for RFID Authentication Protocols

Abstract: Abstract. In this paper, we propose a new variant of indistinguishabilitybased security model for the RFID authentication protocol, which allows an adversary to obtain an authentication result and secret key of a target tag. Ng et al. showed that symmetric-key based RFID authentication protocols cannot be resilient to the above information leakage simultaneously in the Paise-Vaudenay security model. We review the existing result and extend the Juels-Weis security model to satisfy these properties by using a su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…In order to preserve the privacy of RFID authentication systems, many privacy models have been formalized in the literature, for example, . Among them, there are five main categories, indistinguishability‐based models , unpredictability‐based models , simulation‐based models , universal composability‐based models , and zero‐knowledge‐based models . These privacy models have captured strong adversarial capabilities regarding tag anonymity and untraceability.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to preserve the privacy of RFID authentication systems, many privacy models have been formalized in the literature, for example, . Among them, there are five main categories, indistinguishability‐based models , unpredictability‐based models , simulation‐based models , universal composability‐based models , and zero‐knowledge‐based models . These privacy models have captured strong adversarial capabilities regarding tag anonymity and untraceability.…”
Section: Introductionmentioning
confidence: 99%
“…These privacy models have captured strong adversarial capabilities regarding tag anonymity and untraceability. And some of them consider forward privacy as well . We will give a detailed review of these forward privacy models in Related work (Section 1.1).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation