Narrow privacy and desynchronization in Vaudenay’s RFID model

Ferucio Laurenţiu Ţiplea1
1Department of Computer Science, Alexandru Ioan Cuza University of Iaşi, Iaşi, Romania

Tóm tắt

Từ khóa


Tài liệu tham khảo

Armknecht, F., Sadeghi, A.R., Scafuro, A., Visconti, I., Wachsmann, C.: Impossibility results for RFID privacy notions. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science XI, pp. 39–63. Springer, Berlin, Heidelberg (2010)

Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: SIMON and SPECK: block ciphers for the internet of things. IACR Cryptology ePrint Archive 2015, 585 (2015)

Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference, DAC ’15, pp. 175:1–175:6. ACM, New York, USA (2015). https://doi.org/10.1145/2744769.2747946

Canard, S., Coisel, I.: Data synchronization in privacy-preserving RFID authentication schemes. In: Conference on RFID Security (2008)

Ţiplea, F.L.: Lessons to be learned for a good design of private RFID schemes. IEEE Trans. Depend. Secur. Comput. (2021)

Dimitriou, T.: Key evolving RFID systems: forward/backward privacy and ownership transfer of RFID tags. Ad Hoc Netw. 37, 195–208 (2016). https://doi.org/10.1016/j.adhoc.2015.08.019

Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 3rd edn. Wiley (2010)

Garcia, F.D., van Rossum, P.: Modeling privacy for off-line RFID systems. In: Gollmann, D., Lanet, J.L., Iguchi-Cartigny, J. (eds.) Smart Card Research and Advanced Application, pp. 194–208. Springer, Berlin Heidelberg, Berlin, Heidelberg (2010)

Hermans, J., Pashalidis Andreasand Vercauteren, F., Preneel, B.: A new RFID privacy model. In: V. Atluri, C. Diaz (eds.) Computer Security—ESORICS 2011, pp. 568–587. Springer, Berlin, Heidelberg (2011)

Hermans, J., Peeters, R., Preneel, B.: Proper RFID privacy: model and protocols. IEEE Trans. Mobile Comput. 13(12), 2888–2902 (2014). https://doi.org/10.1109/TMC.2014.2314127

Hristea, C., Ţiplea, F.L.: Privacy of stateful RFID systems with constant tag identifiers. IEEE Trans. Inf. Forensics Secur. 15, 1920–1934 (2019). https://doi.org/10.1109/TIFS.2019.2953398

Hristea, C., Ţiplea, F.L.: A PUF-based destructive private mutual authentication RFID protocol. In: J.L. Lanet, C. Toma (eds.) Innovative Security Solutions for Information Technology and Communications. Springer (2019)

Juels, A., Weis, S.A.: Defining strong privacy for RFID. Cryptology ePrint Archive, Report 2006/137 (2006). https://eprint.iacr.org/2006/137

Juels, A., Weis, S.A.: Defining strong privacy for RFID. ACM Trans. Inf. Syst. Secur. 13(1), 7:1–7:23 (2009). https://doi.org/10.1145/1609956.1609963

Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. Chapman & Hall/CRC (2014)

de Koning Gans, G., Garcia, F.D.: Towards a practical solution to the RFID desynchronization problem. In: S.B. Ors Yalcin (ed.) Radio Frequency Identification: Security and Privacy Issues, pp. 203–219. Springer, Berlin, Heidelberg (2010)

Li, Y., Deng, H.R., Bertino, E.: RFID Security and Privacy. Synthesis Lectures on Information Security, Privacy, and Trust. Morgan & Claypool Publishers (2013). https://doi.org/10.2200/S00550ED1V01Y201311SPT007

Ng, C.Y., Susilo, W., Mu, Y., Safavi-Naini, R.: New privacy results on synchronized RFID authentication protocols against tag tracing. In: Proceedings of the 14th European Conference on Research in Computer Security, ESORICS’09, pp. 321–336. Springer, Berlin, Heidelberg (2009)

Paise, R.I., Vaudenay, S.: Mutual authentication in RFID: Security and privacy. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS ’08, pp. 292–299. ACM, New York, NY, USA (2008). https://doi.org/10.1145/1368310.1368352

Preneel, B.: Cryptography best practices (2018). https://secappdev.org/handouts-2018.html

Sipser, M.: Introduction to the Theory of Computation. Cengage Learning (2012)

Vaudenay, S.: On privacy models for RFID. In: Proceedings of the Advances in Crypotology 13th International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT’07, pp. 68–87. Springer, Berlin, Heidelberg (2007)

Ţiplea, F.L., Hristea, C.: PUF protected variables: a solution to RFID security and privacy under corruption with temporary state disclosure. IEEE Trans. Inf. Forensics Secur. 16, 999–1013 (2021). https://doi.org/10.1109/TIFS.2020.3027147