Narrow privacy and desynchronization in Vaudenay’s RFID model
Tóm tắt
Từ khóa
Tài liệu tham khảo
Armknecht, F., Sadeghi, A.R., Scafuro, A., Visconti, I., Wachsmann, C.: Impossibility results for RFID privacy notions. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science XI, pp. 39–63. Springer, Berlin, Heidelberg (2010)
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: SIMON and SPECK: block ciphers for the internet of things. IACR Cryptology ePrint Archive 2015, 585 (2015)
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference, DAC ’15, pp. 175:1–175:6. ACM, New York, USA (2015). https://doi.org/10.1145/2744769.2747946
Canard, S., Coisel, I.: Data synchronization in privacy-preserving RFID authentication schemes. In: Conference on RFID Security (2008)
Ţiplea, F.L.: Lessons to be learned for a good design of private RFID schemes. IEEE Trans. Depend. Secur. Comput. (2021)
Dimitriou, T.: Key evolving RFID systems: forward/backward privacy and ownership transfer of RFID tags. Ad Hoc Netw. 37, 195–208 (2016). https://doi.org/10.1016/j.adhoc.2015.08.019
Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 3rd edn. Wiley (2010)
Garcia, F.D., van Rossum, P.: Modeling privacy for off-line RFID systems. In: Gollmann, D., Lanet, J.L., Iguchi-Cartigny, J. (eds.) Smart Card Research and Advanced Application, pp. 194–208. Springer, Berlin Heidelberg, Berlin, Heidelberg (2010)
Hermans, J., Pashalidis Andreasand Vercauteren, F., Preneel, B.: A new RFID privacy model. In: V. Atluri, C. Diaz (eds.) Computer Security—ESORICS 2011, pp. 568–587. Springer, Berlin, Heidelberg (2011)
Hermans, J., Peeters, R., Preneel, B.: Proper RFID privacy: model and protocols. IEEE Trans. Mobile Comput. 13(12), 2888–2902 (2014). https://doi.org/10.1109/TMC.2014.2314127
Hristea, C., Ţiplea, F.L.: Privacy of stateful RFID systems with constant tag identifiers. IEEE Trans. Inf. Forensics Secur. 15, 1920–1934 (2019). https://doi.org/10.1109/TIFS.2019.2953398
Hristea, C., Ţiplea, F.L.: A PUF-based destructive private mutual authentication RFID protocol. In: J.L. Lanet, C. Toma (eds.) Innovative Security Solutions for Information Technology and Communications. Springer (2019)
Juels, A., Weis, S.A.: Defining strong privacy for RFID. Cryptology ePrint Archive, Report 2006/137 (2006). https://eprint.iacr.org/2006/137
Juels, A., Weis, S.A.: Defining strong privacy for RFID. ACM Trans. Inf. Syst. Secur. 13(1), 7:1–7:23 (2009). https://doi.org/10.1145/1609956.1609963
de Koning Gans, G., Garcia, F.D.: Towards a practical solution to the RFID desynchronization problem. In: S.B. Ors Yalcin (ed.) Radio Frequency Identification: Security and Privacy Issues, pp. 203–219. Springer, Berlin, Heidelberg (2010)
Li, Y., Deng, H.R., Bertino, E.: RFID Security and Privacy. Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool Publishers (2013). https://doi.org/10.2200/S00550ED1V01Y201311SPT007
Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: New privacy results on synchronized RFID authentication protocols against tag tracing. In: Proceedings of the 14th European Conference on Research in Computer Security, ESORICS’09, pp. 321–336. Springer, Berlin, Heidelberg (2009)
Paise, R.I., Vaudenay, S.: Mutual authentication in RFID: Security and privacy. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS ’08, pp. 292–299. ACM, New York, NY, USA (2008). https://doi.org/10.1145/1368310.1368352
Preneel, B.: Cryptography best practices (2018). https://secappdev.org/handouts-2018.html
Sipser, M.: Introduction to the Theory of Computation. Cengage Learning (2012)
Vaudenay, S.: On privacy models for RFID. In: Proceedings of the Advances in Crypotology 13th International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT’07, pp. 68–87. Springer, Berlin, Heidelberg (2007)